2 // $Id: spam.php,v 1.195 2007/06/29 15:35:53 henoheno Exp $
3 // Copyright (C) 2006-2007 PukiWiki Developers Team
4 // License: GPL v2 or (at your option) any later version
6 // Functions for Concept-work of spam-uri metrics
8 // (PHP 4 >= 4.3.0): preg_match_all(PREG_OFFSET_CAPTURE): $method['uri_XXX'] related feature
10 if (! defined('SPAM_INI_FILE')) define('SPAM_INI_FILE', 'spam.ini.php');
11 if (! defined('DOMAIN_INI_FILE')) define('DOMAIN_INI_FILE', 'domain.ini.php');
13 // ---------------------
16 // (PHP 4 >= 4.2.0): var_export(): mail-reporting and dump related
17 if (! function_exists('var_export')) {
18 function var_export() {
19 return 'var_export() is not found on this server' . "\n";
23 // (PHP 4 >= 4.2.0): preg_grep() enables invert option
24 function preg_grep_invert($pattern = '//', $input = array())
27 if (! isset($invert)) $invert = defined('PREG_GREP_INVERT');
30 return preg_grep($pattern, $input, PREG_GREP_INVERT);
32 $result = preg_grep($pattern, $input);
34 return array_diff($input, preg_grep($pattern, $input));
43 // Very roughly, shrink the lines of var_export()
44 // NOTE: If the same data exists, it must be corrupted.
45 function var_export_shrink($expression, $return = FALSE, $ignore_numeric_keys = FALSE)
47 $result = var_export($expression, TRUE);
49 $result = preg_replace(
50 // Remove a newline and spaces
51 '# => \n *array \(#', ' => array (',
55 if ($ignore_numeric_keys) {
56 $result =preg_replace(
57 // Remove numeric keys
58 '#^( *)[0-9]+ => #m', '$1',
71 // Remove redundant values from array()
72 function array_unique_recursive($array = array())
74 if (! is_array($array)) return $array;
77 foreach($array as $key => $value){
78 if (is_array($value)) {
79 $array[$key] = array_unique_recursive($value);
81 if (isset($tmp[$value])) {
92 // Renumber all numeric keys from 0
93 function array_renumber_numeric_keys(& $array)
95 if (! is_array($array)) return $array;
99 foreach($array as $key => $value){
100 if (is_array($value)) array_renumber_numeric_keys($array[$key]); // Recurse
101 if (is_numeric($key)) $tmp[$key] = ++$count;
103 array_rename_keys($array, $tmp);
108 // Roughly strings(1) using PCRE
109 // This function is useful to:
110 // * Reduce the size of data, from removing unprintable binary data
111 // * Detect _bare_strings_ from binary data
113 // http://www.freebsd.org/cgi/man.cgi?query=strings (Man-page of GNU strings)
114 // http://www.pcre.org/pcre.txt
115 // Note: mb_ereg_replace() is one of mbstring extension's functions
116 // and need to init its encoding.
117 function strings($binary = '', $min_len = 4, $ignore_space = FALSE, $multibyte = FALSE)
120 $binary = (is_array($binary) || $binary === TRUE) ? '' : strval($binary);
122 $regex = $ignore_space ?
123 '[^[:graph:] \t\n]+' : // Remove "\0" etc, and readable spaces
124 '[^[:graph:][:space:]]+'; // Preserve readable spaces if possible
126 $binary = $multibyte ?
127 mb_ereg_replace($regex, "\n", $binary) :
128 preg_replace('/' . $regex . '/s', "\n", $binary);
131 $binary = preg_replace(
146 // The last character seems "\n" or not
147 $br = (! empty($binary) && $binary[strlen($binary) - 1] == "\n") ? "\n" : '';
149 $min_len = min(1024, intval($min_len));
150 $regex = '/^.{' . $min_len . ',}/S';
151 $binary = implode("\n", preg_grep($regex, explode("\n", $binary))) . $br;
157 // Reverse $string with specified delimiter
158 function delimiter_reverse($string = 'foo.bar.example.com', $from_delim = '.', $to_delim = '.')
160 if (! is_string($string) || ! is_string($from_delim) || ! is_string($to_delim))
163 // com.example.bar.foo
164 return implode($to_delim, array_reverse(explode($from_delim, $string)));
168 // ---------------------
171 // Return an array of URIs in the $string
172 // [OK] http://nasty.example.org#nasty_string
173 // [OK] http://nasty.example.org:80/foo/xxx#nasty_string/bar
174 // [OK] ftp://nasty.example.org:80/dfsdfs
175 // [OK] ftp://cnn.example.com&story=breaking_news@10.0.0.1/top_story.htm (from RFC3986)
176 function uri_pickup($string = '')
178 if (! is_string($string)) return array();
180 // Not available for: IDN(ignored)
183 // scheme://userinfo@host:port/path/or/pathinfo/maybefile.and?query=string#fragment
184 // Refer RFC3986 (Regex below is not strict)
185 '#(\b[a-z][a-z0-9.+-]{1,8}):[/\\\]+' . // 1: Scheme
187 '([^\s<>"\'\[\]/\#?@]*)' . // 2: Userinfo (Username)
191 '\[[0-9a-f:.]+\]' . '|' . // IPv6([colon-hex and dot]): RFC2732
192 '(?:[0-9]{1,3}\.){3}[0-9]{1,3}' . '|' . // IPv4(dot-decimal): 001.22.3.44
193 '[a-z0-9_-][a-z0-9_.-]+[a-z0-9_-]' . // hostname(FQDN) : foo.example.org
195 '(?::([0-9]*))?' . // 4: Port
196 '((?:/+[^\s<>"\'\[\]/\#]+)*/+)?' . // 5: Directory path or path-info
197 '([^\s<>"\'\[\]\#?]+)?' . // 6: File?
198 '(?:\?([^\s<>"\'\[\]\#]+))?' . // 7: Query string
199 '(?:\#([a-z0-9._~%!$&\'()*+,;=:@-]*))?' . // 8: Fragment
201 $string, $array, PREG_SET_ORDER | PREG_OFFSET_CAPTURE
205 static $parts = array(
206 1 => 'scheme', 2 => 'userinfo', 3 => 'host', 4 => 'port',
207 5 => 'path', 6 => 'file', 7 => 'query', 8 => 'fragment'
209 $default = array('');
210 foreach(array_keys($array) as $uri) {
211 $_uri = & $array[$uri];
212 array_rename_keys($_uri, $parts, TRUE, $default);
213 $offset = $_uri['scheme'][1]; // Scheme's offset = URI's offset
214 foreach(array_keys($_uri) as $part) {
215 $_uri[$part] = & $_uri[$part][0]; // Remove offsets
219 foreach(array_keys($array) as $uri) {
220 $_uri = & $array[$uri];
221 if ($_uri['scheme'] === '') {
222 unset($array[$uri]); // Considererd harmless
225 unset($_uri[0]); // Matched string itself
226 $_uri['area']['offset'] = $offset; // Area offset for area_measure()
232 // Normalize an array of URI arrays
233 // NOTE: Give me the uri_pickup() results
234 function uri_pickup_normalize(& $pickups, $destructive = TRUE)
236 if (! is_array($pickups)) return $pickups;
239 foreach (array_keys($pickups) as $key) {
240 $_key = & $pickups[$key];
241 $_key['scheme'] = isset($_key['scheme']) ? scheme_normalize($_key['scheme']) : '';
242 $_key['host'] = isset($_key['host']) ? host_normalize($_key['host']) : '';
243 $_key['port'] = isset($_key['port']) ? port_normalize($_key['port'], $_key['scheme'], FALSE) : '';
244 $_key['path'] = isset($_key['path']) ? strtolower(path_normalize($_key['path'])) : '';
245 $_key['file'] = isset($_key['file']) ? file_normalize($_key['file']) : '';
246 $_key['query'] = isset($_key['query']) ? query_normalize($_key['query']) : '';
247 $_key['fragment'] = isset($_key['fragment']) ? strtolower($_key['fragment']) : '';
250 foreach (array_keys($pickups) as $key) {
251 $_key = & $pickups[$key];
252 $_key['scheme'] = isset($_key['scheme']) ? scheme_normalize($_key['scheme']) : '';
253 $_key['host'] = isset($_key['host']) ? strtolower($_key['host']) : '';
254 $_key['port'] = isset($_key['port']) ? port_normalize($_key['port'], $_key['scheme'], FALSE) : '';
255 $_key['path'] = isset($_key['path']) ? path_normalize($_key['path']) : '';
262 // An URI array => An URI (See uri_pickup())
264 // $pickups = uri_pickup('a string include some URIs');
266 // foreach (array_keys($pickups) as $key) {
267 // $uris[$key] = uri_pickup_implode($pickups[$key]);
269 function uri_pickup_implode($uri = array())
271 if (empty($uri) || ! is_array($uri)) return NULL;
274 if (isset($uri['scheme']) && $uri['scheme'] !== '') {
275 $tmp[] = & $uri['scheme'];
278 if (isset($uri['userinfo']) && $uri['userinfo'] !== '') {
279 $tmp[] = & $uri['userinfo'];
282 if (isset($uri['host']) && $uri['host'] !== '') {
283 $tmp[] = & $uri['host'];
285 if (isset($uri['port']) && $uri['port'] !== '') {
287 $tmp[] = & $uri['port'];
289 if (isset($uri['path']) && $uri['path'] !== '') {
290 $tmp[] = & $uri['path'];
292 if (isset($uri['file']) && $uri['file'] !== '') {
293 $tmp[] = & $uri['file'];
295 if (isset($uri['query']) && $uri['query'] !== '') {
297 $tmp[] = & $uri['query'];
299 if (isset($uri['fragment']) && $uri['fragment'] !== '') {
301 $tmp[] = & $uri['fragment'];
304 return implode('', $tmp);
307 // $array['something'] => $array['wanted']
308 function array_rename_keys(& $array, $keys = array('from' => 'to'), $force = FALSE, $default = '')
310 if (! is_array($array) || ! is_array($keys)) return FALSE;
312 // Nondestructive test
314 foreach(array_keys($keys) as $from)
315 if (! isset($array[$from]))
318 foreach($keys as $from => $to) {
319 if ($from === $to) continue;
320 if (! $force || isset($array[$from])) {
321 $array[$to] = & $array[$from];
322 unset($array[$from]);
324 $array[$to] = $default;
331 // ---------------------
334 // Pickup all of markup areas
335 function area_pickup($string = '', $method = array())
338 if (empty($method)) return $area;
340 // Anchor tag pair by preg_match and preg_match_all()
342 // [OK] <a href= >Good site!</a>
343 // [OK] <a href= "#" >test</a>
344 // [OK] <a href="http://nasty.example.com">visit http://nasty.example.com/</a>
345 // [OK] <a href=\'http://nasty.example.com/\' >discount foobar</a>
346 // [NG] <a href="http://ng.example.com">visit http://ng.example.com _not_ended_
347 $regex = '#<a\b[^>]*\bhref\b[^>]*>.*?</a\b[^>]*(>)#is';
348 if (isset($method['area_anchor'])) {
350 $count = isset($method['asap']) ?
351 preg_match($regex, $string) :
352 preg_match_all($regex, $string, $areas);
353 if (! empty($count)) $area['area_anchor'] = $count;
355 if (isset($method['uri_anchor'])) {
357 preg_match_all($regex, $string, $areas, PREG_SET_ORDER | PREG_OFFSET_CAPTURE);
358 foreach(array_keys($areas) as $_area) {
359 $areas[$_area] = array(
360 $areas[$_area][0][1], // Area start (<a href>)
361 $areas[$_area][1][1], // Area end (</a>)
364 if (! empty($areas)) $area['uri_anchor'] = $areas;
367 // phpBB's "BBCode" pair by preg_match and preg_match_all()
369 // [OK] [url]http://nasty.example.com/[/url]
370 // [OK] [link]http://nasty.example.com/[/link]
371 // [OK] [url=http://nasty.example.com]visit http://nasty.example.com/[/url]
372 // [OK] [link http://nasty.example.com/]buy something[/link]
373 $regex = '#\[(url|link)\b[^\]]*\].*?\[/\1\b[^\]]*(\])#is';
374 if (isset($method['area_bbcode'])) {
376 $count = isset($method['asap']) ?
377 preg_match($regex, $string) :
378 preg_match_all($regex, $string, $areas, PREG_SET_ORDER);
379 if (! empty($count)) $area['area_bbcode'] = $count;
381 if (isset($method['uri_bbcode'])) {
383 preg_match_all($regex, $string, $areas, PREG_SET_ORDER | PREG_OFFSET_CAPTURE);
384 foreach(array_keys($areas) as $_area) {
385 $areas[$_area] = array(
386 $areas[$_area][0][1], // Area start ([url])
387 $areas[$_area][2][1], // Area end ([/url])
390 if (! empty($areas)) $area['uri_bbcode'] = $areas;
393 // Various Wiki syntax
394 // [text_or_uri>text_or_uri]
395 // [text_or_uri:text_or_uri]
396 // [text_or_uri|text_or_uri]
397 // [text_or_uri->text_or_uri]
398 // [text_or_uri text_or_uri] // MediaWiki
399 // MediaWiki: [http://nasty.example.com/ visit http://nasty.example.com/]
404 // If in doubt, it's a little doubtful
405 // if (Area => inside <= Area) $brief += -1
406 function area_measure($areas, & $array, $belief = -1, $a_key = 'area', $o_key = 'offset')
408 if (! is_array($areas) || ! is_array($array)) return;
410 $areas_keys = array_keys($areas);
411 foreach(array_keys($array) as $u_index) {
412 $offset = isset($array[$u_index][$o_key]) ?
413 intval($array[$u_index][$o_key]) : 0;
414 foreach($areas_keys as $a_index) {
415 if (isset($array[$u_index][$a_key])) {
416 $offset_s = intval($areas[$a_index][0]);
417 $offset_e = intval($areas[$a_index][1]);
418 // [Area => inside <= Area]
419 if ($offset_s < $offset && $offset < $offset_e) {
420 $array[$u_index][$a_key] += $belief;
427 // ---------------------
430 // Preprocess: Removing uninterest part for URI detection
431 function spam_uri_removing_hocus_pocus($binary = '', $method = array())
433 $length = 4 ; // 'http'(1) and '://'(2) and 'fqdn'(1)
434 if (is_array($method)) {
435 // '<a'(2) or 'href='(5) or '>'(1) or '</a>'(4)
436 // '[uri'(4) or ']'(1) or '[/uri]'(6)
437 if (isset($method['area_anchor']) || isset($method['uri_anchor']) ||
438 isset($method['area_bbcode']) || isset($method['uri_bbcode']))
439 $length = 1; // Seems not effective
442 // Removing sequential spaces and too short lines
443 $binary = strings($binary, $length, TRUE, FALSE); // Multibyte NOT needed
445 // Remove words (has no '<>[]:') between spaces
446 $binary = preg_replace('/[ \t][\w.,()\ \t]+[ \t]/', ' ', $binary);
451 // Preprocess: Domain exposure callback (See spam_uri_pickup_preprocess())
452 // http://victim.example.org/?foo+site:nasty.example.com+bar
453 // => http://nasty.example.com/?refer=victim.example.org
454 // NOTE: 'refer=' is not so good for (at this time).
455 // Consider about using IP address of the victim, try to avoid that.
456 function _preg_replace_callback_domain_exposure($matches = array())
460 // Preserve the victim URI as a complicity or ...
461 if (isset($matches[5])) {
463 $matches[1] . '://' . // scheme
464 $matches[2] . '/' . // victim.example.org
465 $matches[3]; // The rest of all (before victim)
469 if (isset($matches[4])) {
471 $matches[1] . '://' . // scheme
472 $matches[4] . // nasty.example.com
473 '/?refer=' . strtolower($matches[2]) . // victim.example.org
480 // Preprocess: rawurldecode() and adding space(s) and something
481 // to detect/count some URIs _if possible_
482 // NOTE: It's maybe danger to var_dump(result). [e.g. 'javascript:']
483 // [OK] http://victim.example.org/?site:nasty.example.org
484 // [OK] http://victim.example.org/nasty.example.org
485 // [OK] http://victim.example.org/go?http%3A%2F%2Fnasty.example.org
486 // [OK] http://victim.example.org/http://nasty.example.org
487 function spam_uri_pickup_preprocess($string = '', $method = array())
489 if (! is_string($string)) return '';
491 $string = spam_uri_removing_hocus_pocus(rawurldecode($string), $method);
492 //var_dump(htmlspecialchars($string));
494 // Domain exposure (simple)
495 // http://victim.example.org/nasty.example.org/path#frag
496 // => http://nasty.example.org/?refer=victim.example.org and original
497 $string = preg_replace(
500 'ime\.nu' . '|' . // 2ch.net
501 'ime\.st' . '|' . // 2ch.net
502 'link\.toolbot\.com' . '|' .
505 '/([a-z0-9.%_-]+\.[a-z0-9.%_-]+)#i', // nasty.example.org
506 'http://$2/?refer=$1 $0', // Preserve $0 or remove?
510 // Domain exposure (gate-big5)
511 // http://victim.example.org/gate/big5/nasty.example.org/path
512 // => http://nasty.example.org/?refer=victim.example.org and original
513 $string = preg_replace(
516 'big5.51job.com' . '|' .
517 'big5.china.com' . '|' .
518 'big5.xinhuanet.com' . '|' .
521 '/([a-z0-9.%_-]+\.[a-z0-9.%_-]+)' .
522 '#i', // nasty.example.org
523 'http://$2/?refer=$1 $0', // Preserve $0 or remove?
527 // Domain exposure (site:) See _preg_replace_callback_domain_exposure()
528 $string = preg_replace_callback(
530 '#(h?ttp)://' . // 1:Scheme
533 '(?:[a-z0-9_.-]+\.)?[a-z0-9_-]+\.[a-z0-9_-]+' .
534 // Something Google: http://www.google.com/supported_domains
535 // AltaVista: http://es.altavista.com/web/results?q=site%3Anasty.example.org+foobar
536 // Live Search: search.live.com
537 // MySpace: http://sads.myspace.com/Modules/Search/Pages/Search.aspx?_snip_&searchString=site:nasty.example.org
538 // (also searchresults.myspace.com)
541 // search.orange.co.uk
545 '([a-z0-9?=&.%_/\'\\\+-]+)' . // 3:path/?query=foo+bar+
546 '\bsite:([a-z0-9.%_-]+\.[a-z0-9.%_-]+)' . // 4:site:nasty.example.com
547 '()' . // 5:Preserve or remove?
550 '_preg_replace_callback_domain_exposure',
554 // URI exposure (uriuri => uri uri)
555 $string = preg_replace(
557 '#(?<! )(?:https?|ftp):/#i',
558 // '#[a-z][a-z0-9.+-]{1,8}://#i',
559 // '#[a-z][a-z0-9.+-]{1,8}://#i'
568 // Main function of spam-uri pickup,
569 // A wrapper function of uri_pickup()
570 function spam_uri_pickup($string = '', $method = array())
572 if (! is_array($method) || empty($method)) {
573 $method = check_uri_spam_method();
576 $string = spam_uri_pickup_preprocess($string, $method);
578 $array = uri_pickup($string);
580 // Area elevation of URIs, for '(especially external)link' intension
581 if (! empty($array)) {
583 if (isset($method['uri_anchor'])) $_method['uri_anchor'] = & $method['uri_anchor'];
584 if (isset($method['uri_bbcode'])) $_method['uri_bbcode'] = & $method['uri_bbcode'];
585 $areas = area_pickup($string, $_method, TRUE);
586 if (! empty($areas)) {
587 $area_shadow = array();
588 foreach (array_keys($array) as $key) {
589 $area_shadow[$key] = & $array[$key]['area'];
590 foreach (array_keys($_method) as $_key) {
591 $area_shadow[$key][$_key] = 0;
594 foreach (array_keys($_method) as $_key) {
595 if (isset($areas[$_key])) {
596 area_measure($areas[$_key], $area_shadow, 1, $_key);
602 // Remove 'offset's for area_measure()
603 foreach(array_keys($array) as $key)
604 unset($array[$key]['area']['offset']);
610 // ---------------------
613 // Scheme normalization: Renaming the schemes
614 // snntp://example.org => nntps://example.org
615 // NOTE: Keep the static lists simple. See also port_normalize().
616 function scheme_normalize($scheme = '', $abbrevs_harmfull = TRUE)
618 // Abbreviations they have no intention of link
619 static $abbrevs = array(
624 // Aliases => normalized ones
625 static $aliases = array(
635 if (! is_string($scheme)) return '';
637 $scheme = strtolower($scheme);
638 if (isset($abbrevs[$scheme])) {
639 $scheme = $abbrevs_harmfull ? $abbrevs[$scheme] : '';
641 if (isset($aliases[$scheme])) {
642 $scheme = $aliases[$scheme];
648 // Hostname normlization (Destructive)
649 // www.foo => www.foo ('foo' seems TLD)
650 // www.foo.bar => foo.bar
651 // www.10.20 => www.10.20 (Invalid hostname)
653 // 'www' is mostly used as traditional hostname of WWW server.
654 // 'www.foo.bar' may be identical with 'foo.bar'.
655 function host_normalize($host = '')
657 if (! is_string($host)) return '';
659 $host = strtolower($host);
661 if (preg_match('/^www\.(.+\.[a-z]+)$/', $host, $matches)) {
668 // Port normalization: Suppress the (redundant) default port
669 // HTTP://example.org:80/ => http://example.org/
670 // HTTP://example.org:8080/ => http://example.org:8080/
671 // HTTPS://example.org:443/ => https://example.org/
672 function port_normalize($port, $scheme, $scheme_normalize = FALSE)
674 // Schemes that users _maybe_ want to add protocol-handlers
675 // to their web browsers. (and attackers _maybe_ want to use ...)
676 // Reference: http://www.iana.org/assignments/port-numbers
677 static $array = array(
678 // scheme => default port
704 // intval() converts '0-1' to '0', so preg_match() rejects these invalid ones
705 if (! is_numeric($port) || $port < 0 || preg_match('/[^0-9]/i', $port))
708 $port = intval($port);
709 if ($scheme_normalize) $scheme = scheme_normalize($scheme);
710 if (isset($array[$scheme]) && $port == $array[$scheme])
711 $port = ''; // Ignore the defaults
716 // Path normalization
717 // http://example.org => http://example.org/
718 // http://example.org#hoge => http://example.org/#hoge
719 // http://example.org/path/a/b/./c////./d => http://example.org/path/a/b/c/d
720 // http://example.org/path/../../a/../back => http://example.org/back
721 function path_normalize($path = '', $divider = '/', $add_root = TRUE)
723 if (! is_string($divider)) return is_string($path) ? $path : '';
726 $first_div = & $divider;
730 if (! is_string($path) || $path == '') return $first_div;
732 if (strpos($path, $divider, strlen($path) - strlen($divider)) === FALSE) {
735 $last_div = & $divider;
738 $array = explode($divider, $path);
740 // Remove paddings ('//' and '/./')
741 foreach(array_keys($array) as $key) {
742 if ($array[$key] == '' || $array[$key] == '.') {
747 // Remove back-tracks ('/../')
749 foreach($array as $value) {
750 if ($value == '..') {
753 array_push($tmp, $value);
761 return $first_div . implode($divider, $array) . $last_div;
765 // DirectoryIndex normalize (Destructive and rough)
766 // TODO: sample.en.ja.html.gz => sample.html
767 function file_normalize($file = 'index.html.en')
769 static $simple_defaults = array(
770 'default.htm' => TRUE,
771 'default.html' => TRUE,
772 'default.asp' => TRUE,
773 'default.aspx' => TRUE,
774 'index' => TRUE, // Some system can omit the suffix
777 static $content_suffix = array(
778 // index.xxx, sample.xxx
793 static $language_suffix = array(
794 // Reference: Apache 2.0.59 'AddLanguage' default
823 // Reference: Apache 2.0.59 default 'index.html' variants
829 static $charset_suffix = array(
830 // Reference: Apache 2.0.59 'AddCharset' default
831 'iso8859-1' => TRUE, // ISO-8859-1
832 'latin1' => TRUE, // ISO-8859-1
833 'iso8859-2' => TRUE, // ISO-8859-2
834 'latin2' => TRUE, // ISO-8859-2
835 'cen' => TRUE, // ISO-8859-2
836 'iso8859-3' => TRUE, // ISO-8859-3
837 'latin3' => TRUE, // ISO-8859-3
838 'iso8859-4' => TRUE, // ISO-8859-4
839 'latin4' => TRUE, // ISO-8859-4
840 'iso8859-5' => TRUE, // ISO-8859-5
841 'latin5' => TRUE, // ISO-8859-5
842 'cyr' => TRUE, // ISO-8859-5
843 'iso-ru' => TRUE, // ISO-8859-5
844 'iso8859-6' => TRUE, // ISO-8859-6
845 'latin6' => TRUE, // ISO-8859-6
846 'arb' => TRUE, // ISO-8859-6
847 'iso8859-7' => TRUE, // ISO-8859-7
848 'latin7' => TRUE, // ISO-8859-7
849 'grk' => TRUE, // ISO-8859-7
850 'iso8859-8' => TRUE, // ISO-8859-8
851 'latin8' => TRUE, // ISO-8859-8
852 'heb' => TRUE, // ISO-8859-8
853 'iso8859-9' => TRUE, // ISO-8859-9
854 'latin9' => TRUE, // ISO-8859-9
855 'trk' => TRUE, // ISO-8859-9
856 'iso2022-jp'=> TRUE, // ISO-2022-JP
857 'jis' => TRUE, // ISO-2022-JP
858 'iso2022-kr'=> TRUE, // ISO-2022-KR
859 'kis' => TRUE, // ISO-2022-KR
860 'iso2022-cn'=> TRUE, // ISO-2022-CN
861 'cis' => TRUE, // ISO-2022-CN
863 'cp-1251' => TRUE, // ru, WINDOWS-1251
864 'win-1251' => TRUE, // ru, WINDOWS-1251
865 'cp866' => TRUE, // ru
866 'koi8-r' => TRUE, // ru, KOI8-r
867 'koi8-ru' => TRUE, // ru, KOI8-r
868 'koi8-uk' => TRUE, // ru, KOI8-ru
869 'ua' => TRUE, // ru, KOI8-ru
870 'ucs2' => TRUE, // ru, ISO-10646-UCS-2
871 'ucs4' => TRUE, // ru, ISO-10646-UCS-4
874 // Reference: Apache 2.0.59 default 'index.html' variants
879 // May uncompress by web browsers on the fly
880 // Must be at the last of the filename
881 // Reference: Apache 2.0.59 'AddEncoding'
882 static $encoding_suffix = array(
887 if (! is_string($file)) return '';
888 $_file = strtolower($file);
889 if (isset($simple_defaults[$_file])) return '';
892 // Roughly removing language/character-set/encoding suffixes
894 // * Apache 2 document about 'Content-negotiaton', 'mod_mime' and 'mod_negotiation'
895 // http://httpd.apache.org/docs/2.0/content-negotiation.html
896 // http://httpd.apache.org/docs/2.0/mod/mod_mime.html
897 // http://httpd.apache.org/docs/2.0/mod/mod_negotiation.html
898 // * http://www.iana.org/assignments/character-sets
899 // * RFC3066: Tags for the Identification of Languages
900 // http://www.ietf.org/rfc/rfc3066.txt
901 // * ISO 639: codes of 'language names'
902 $suffixes = explode('.', $_file);
903 $body = array_shift($suffixes);
905 // Remove the last .gz/.z
906 $last_key = end(array_keys($suffixes));
907 if (isset($encoding_suffix[$suffixes[$last_key]])) {
908 unset($suffixes[$last_key]);
911 // Cut language and charset suffixes
912 foreach($suffixes as $key => $value){
913 if (isset($language_suffix[$value]) || isset($charset_suffix[$value])) {
914 unset($suffixes[$key]);
917 if (empty($suffixes)) return $body;
920 $count = count($suffixes);
922 $current = current($suffixes);
923 if ($body == 'index' && $count == 1 && isset($content_suffix[$current])) return '';
928 // Sort query-strings if possible (Destructive and rough)
929 // [OK] &&&&f=d&b&d&c&a=0dd => a=0dd&b&c&d&f=d
930 // [OK] nothing==&eg=dummy&eg=padding&eg=foobar => eg=foobar
931 function query_normalize($string = '', $equal = TRUE, $equal_cutempty = TRUE, $stortolower = TRUE)
933 if (! is_string($string)) return '';
934 if ($stortolower) $string = strtolower($string);
936 $array = explode('&', $string);
938 // Remove '&' paddings
939 foreach(array_keys($array) as $key) {
940 if ($array[$key] == '') {
945 // Consider '='-sepalated input and paddings
947 $equals = $not_equals = array();
948 foreach ($array as $part) {
949 if (strpos($part, '=') === FALSE) {
950 $not_equals[] = $part;
952 list($key, $value) = explode('=', $part, 2);
953 $value = ltrim($value, '=');
954 if (! $equal_cutempty || $value != '') {
955 $equals[$key] = $value;
960 $array = & $not_equals;
961 foreach ($equals as $key => $value) {
962 $array[] = $key . '=' . $value;
968 return implode('&', $array);
971 // ---------------------
972 // Part One : Checker
974 // Rough implementation of globbing
976 // USAGE: $regex = '/^' . generate_glob_regex('*.txt', '/') . '$/i';
978 function generate_glob_regex($string = '', $divider = '/')
980 static $from = array(
983 // 22 => '[', // Maybe cause regex compilation error (e.g. '[]')
999 if (! is_string($string)) return '';
1001 $string = str_replace($from, $mid, $string); // Hide
1002 $string = preg_quote($string, $divider);
1003 $string = str_replace($mid, $to, $string); // Unhide
1008 // Rough hostname checker
1010 // TODO: Strict digit, 0x, CIDR, IPv6
1011 function is_ip($string = '')
1013 if (preg_match('/^' .
1014 '(?:[0-9]{1,3}\.){3}[0-9]{1,3}' . '|' .
1015 '(?:[0-9]{1,3}\.){1,3}' . '$/',
1017 return 4; // Seems IPv4(dot-decimal)
1019 return 0; // Seems not IP
1023 // Generate host (FQDN, IPv4, ...) regex
1024 // 'localhost' : Matches with 'localhost' only
1025 // 'example.org' : Matches with 'example.org' only (See host_normalize() about 'www')
1026 // '.example.org' : Matches with ALL FQDN ended with '.example.org'
1027 // '*.example.org' : Almost the same of '.example.org' except 'www.example.org'
1028 // '10.20.30.40' : Matches with IPv4 address '10.20.30.40' only
1029 // [TODO] '192.' : Matches with all IPv4 hosts started with '192.'
1030 // TODO: IPv4, CIDR?, IPv6
1031 function generate_host_regex($string = '', $divider = '/')
1033 if (! is_string($string)) return '';
1035 if (mb_strpos($string, '.') === FALSE)
1036 return generate_glob_regex($string, $divider);
1039 if (is_ip($string)) {
1041 return generate_glob_regex($string, $divider);
1043 // FQDN or something
1044 $part = explode('.', $string, 2);
1045 if ($part[0] == '') {
1046 $part[0] = '(?:.*\.)?'; // And all related FQDN
1047 } else if ($part[0] == '*') {
1048 $part[0] = '.*\.'; // All subdomains/hosts only
1050 return generate_glob_regex($string, $divider);
1052 $part[1] = generate_glob_regex($part[1], $divider);
1053 return implode('', $part);
1057 function get_blocklist($list = '')
1061 if ($list === NULL) {
1062 $regexes = NULL; // Unset
1066 if (! isset($regexes)) {
1068 if (file_exists(SPAM_INI_FILE)) {
1069 $blocklist = array();
1070 include(SPAM_INI_FILE);
1071 // $blocklist['badhost'] = array(
1072 // '*.blogspot.com', // Blog services's subdomains (only)
1073 // 'IANA-examples' => '#^(?:.*\.)?example\.(?:com|net|org)$#',
1075 if (isset($blocklist['list'])) {
1076 $regexes['list'] = & $blocklist['list'];
1079 $blocklist['list'] = array(
1080 'goodhost' => FALSE,
1084 foreach(array_keys($blocklist['list']) as $_list) {
1085 if (! isset($blocklist[$_list])) continue;
1086 foreach ($blocklist[$_list] as $key => $value) {
1087 if (is_array($value)) {
1088 $regexes[$_list][$key] = array();
1089 foreach($value as $_key => $_value) {
1090 get_blocklist_add($regexes[$_list][$key], $_key, $_value);
1093 get_blocklist_add($regexes[$_list], $key, $value);
1096 unset($blocklist[$_list]);
1102 return $regexes; // ALL
1103 } else if (isset($regexes[$list])) {
1104 return $regexes[$list];
1110 // Subroutine of get_blocklist()
1111 function get_blocklist_add(& $array, $key = 0, $value = '*.example.org')
1113 if (is_string($key)) {
1114 $array[$key] = & $value; // Treat $value as a regex
1116 $array[$value] = '/^' . generate_host_regex($value, '/') . '$/i';
1120 // Blocklist metrics: Separate $host, to $blocked and not blocked
1121 function blocklist_distiller(& $hosts, $keys = array('goodhost', 'badhost'), $asap = FALSE)
1123 if (! is_array($hosts)) $hosts = array($hosts);
1124 if (! is_array($keys)) $keys = array($keys);
1126 $list = get_blocklist('list');
1129 foreach($keys as $key){
1130 foreach (get_blocklist($key) as $label => $regex) {
1131 if (is_array($regex)) {
1132 foreach($regex as $_label => $_regex) {
1133 $group = preg_grep($_regex, $hosts);
1135 $hosts = array_diff($hosts, $group);
1136 $blocked[$key][$label][$_label] = $group;
1137 if ($asap && $list[$key]) break;
1141 $group = preg_grep($regex, $hosts);
1143 $hosts = array_diff($hosts, $group);
1144 $blocked[$key][$label] = $group;
1145 if ($asap && $list[$key]) break;
1154 // Default (enabled) methods and thresholds (for content insertion)
1155 function check_uri_spam_method($times = 1, $t_area = 0, $rule = TRUE)
1157 $times = intval($times);
1158 $t_area = intval($t_area);
1162 'quantity' => 8 * $times, // Allow N URIs
1163 'non_uniqhost' => 3 * $times, // Allow N duped (and normalized) Hosts
1164 //'non_uniquri'=> 3 * $times, // Allow N duped (and normalized) URIs
1167 'area_anchor' => $t_area, // Using <a href> HTML tag
1168 'area_bbcode' => $t_area, // Using [url] or [link] BBCode
1169 //'uri_anchor' => $t_area, // URI inside <a href> HTML tag
1170 //'uri_bbcode' => $t_area, // URI inside [url] or [link] BBCode
1175 //'asap' => TRUE, // Quit or return As Soon As Possible
1176 'uniqhost' => TRUE, // Show uniq host (at block notification mail)
1177 'badhost' => TRUE, // Check badhost
1183 // Remove non-$positive values
1184 foreach (array_keys($positive) as $key) {
1185 if ($positive[$key] < 0) unset($positive[$key]);
1188 return $positive + $bool;
1191 // Simple/fast spam check
1192 function check_uri_spam($target = '', $method = array())
1197 // Theme to do => Dummy, optional value, or optional array()
1199 //'uniqhost' => TRUE,
1200 //'non_uniqhost'=> 3,
1201 //'non_uniquri' => 3,
1202 //'badhost' => TRUE,
1203 //'area_anchor' => 0,
1204 //'area_bbcode' => 0,
1205 //'uri_anchor' => 0,
1206 //'uri_bbcode' => 0,
1209 // Theme => Volume found (int)
1212 // Flag. If someting defined here,
1213 // one or more spam will be included
1218 //'category' => array(
1223 // Hosts not blocked
1228 $sum = & $progress['sum'];
1229 $is_spam = & $progress['is_spam'];
1230 $progress['method'] = & $method; // Argument
1231 $blocked = & $progress['blocked'];
1232 $hosts = & $progress['hosts'];
1233 $asap = isset($method['asap']);
1236 if (! is_array($method) || empty($method)) {
1237 $method = check_uri_spam_method();
1239 foreach(array_keys($method) as $key) {
1240 if (! isset($sum[$key])) $sum[$key] = 0;
1242 if (! isset($sum['quantity'])) $sum['quantity'] = 0;
1244 if (is_array($target)) {
1245 foreach($target as $str) {
1246 if (! is_string($str)) continue;
1248 $_progress = check_uri_spam($str, $method); // Recurse
1251 $_sum = & $_progress['sum'];
1252 foreach (array_keys($_sum) as $key) {
1253 if (! isset($sum[$key])) {
1254 $sum[$key] = & $_sum[$key];
1256 $sum[$key] += $_sum[$key];
1261 $_is_spam = & $_progress['is_spam'];
1262 foreach (array_keys($_is_spam) as $key) {
1263 $is_spam[$key] = TRUE;
1266 if ($asap && $is_spam) break;
1269 $blocked = array_merge_recursive($blocked, $_progress['blocked']);
1270 $hosts = array_merge_recursive($hosts, $_progress['hosts']);
1274 $blocked = array_unique_recursive($blocked);
1275 $hosts = array_unique_recursive($hosts);
1277 // Recount $sum['badhost']
1278 $sum['badhost'] = array_count_leaves($blocked);
1283 // Area: There's HTML anchor tag
1284 if ((! $asap || ! $is_spam) && isset($method['area_anchor'])) {
1285 $key = 'area_anchor';
1286 $_asap = isset($method['asap']) ? array('asap' => TRUE) : array();
1287 $result = area_pickup($target, array($key => TRUE) + $_asap);
1289 $sum[$key] = $result[$key];
1290 if (isset($method[$key]) && $sum[$key] > $method[$key]) {
1291 $is_spam[$key] = TRUE;
1296 // Area: There's 'BBCode' linking tag
1297 if ((! $asap || ! $is_spam) && isset($method['area_bbcode'])) {
1298 $key = 'area_bbcode';
1299 $_asap = isset($method['asap']) ? array('asap' => TRUE) : array();
1300 $result = area_pickup($target, array($key => TRUE) + $_asap);
1302 $sum[$key] = $result[$key];
1303 if (isset($method[$key]) && $sum[$key] > $method[$key]) {
1304 $is_spam[$key] = TRUE;
1310 if ($asap && $is_spam) return $progress;
1313 $pickups = uri_pickup_normalize(spam_uri_pickup($target, $method));
1316 if (empty($pickups)) return $progress;
1318 // URI: Check quantity
1319 $sum['quantity'] += count($pickups);
1321 if ((! $asap || ! $is_spam) && isset($method['quantity']) &&
1322 $sum['quantity'] > $method['quantity']) {
1323 $is_spam['quantity'] = TRUE;
1326 // URI: used inside HTML anchor tag pair
1327 if ((! $asap || ! $is_spam) && isset($method['uri_anchor'])) {
1328 $key = 'uri_anchor';
1329 foreach($pickups as $pickup) {
1330 if (isset($pickup['area'][$key])) {
1331 $sum[$key] += $pickup['area'][$key];
1332 if(isset($method[$key]) &&
1333 $sum[$key] > $method[$key]) {
1334 $is_spam[$key] = TRUE;
1335 if ($asap && $is_spam) break;
1337 if ($asap && $is_spam) break;
1342 // URI: used inside 'BBCode' pair
1343 if ((! $asap || ! $is_spam) && isset($method['uri_bbcode'])) {
1344 $key = 'uri_bbcode';
1345 foreach($pickups as $pickup) {
1346 if (isset($pickup['area'][$key])) {
1347 $sum[$key] += $pickup['area'][$key];
1348 if(isset($method[$key]) &&
1349 $sum[$key] > $method[$key]) {
1350 $is_spam[$key] = TRUE;
1351 if ($asap && $is_spam) break;
1353 if ($asap && $is_spam) break;
1358 // URI: Uniqueness (and removing non-uniques)
1359 if ((! $asap || ! $is_spam) && isset($method['non_uniquri'])) {
1362 foreach (array_keys($pickups) as $key) {
1363 $uris[$key] = uri_pickup_implode($pickups[$key]);
1365 $count = count($uris);
1366 $uris = array_unique($uris);
1367 $sum['non_uniquri'] += $count - count($uris);
1368 if ($sum['non_uniquri'] > $method['non_uniquri']) {
1369 $is_spam['non_uniquri'] = TRUE;
1371 if (! $asap || ! $is_spam) {
1372 foreach (array_diff(array_keys($pickups),
1373 array_keys($uris)) as $remove) {
1374 unset($pickups[$remove]);
1381 if ($asap && $is_spam) return $progress;
1383 // Host: Uniqueness (uniq / non-uniq)
1384 foreach ($pickups as $pickup) $hosts[] = & $pickup['host'];
1385 $hosts = array_unique($hosts);
1386 $sum['uniqhost'] += count($hosts);
1387 if ((! $asap || ! $is_spam) && isset($method['non_uniqhost'])) {
1388 $sum['non_uniqhost'] = $sum['quantity'] - $sum['uniqhost'];
1389 if ($sum['non_uniqhost'] > $method['non_uniqhost']) {
1390 $is_spam['non_uniqhost'] = TRUE;
1395 if ($asap && $is_spam) return $progress;
1397 // URI: Bad host (Separate good/bad hosts from $hosts)
1398 if ((! $asap || ! $is_spam) && isset($method['badhost'])) {
1401 $list = get_blocklist('list');
1402 $blocked = blocklist_distiller($hosts, array_keys($list), $asap);
1403 foreach($list as $key=>$type){
1404 if (! $type) unset($blocked[$key]); // Ignore goodhost etc
1408 if (! empty($blocked)) $is_spam['badhost'] = TRUE;
1414 // Count leaves (A leaf = value that is not an array, or an empty array)
1415 function array_count_leaves($array = array(), $count_empty = FALSE)
1417 if (! is_array($array) || (empty($array) && $count_empty)) return 1;
1421 foreach ($array as $part) {
1422 $count += array_count_leaves($part, $count_empty);
1427 // An array-leaves to a flat array
1428 function array_flat_leaves($array, $unique = TRUE)
1430 if (! is_array($array)) return $array;
1433 foreach(array_keys($array) as $key) {
1434 if (is_array($array[$key])) {
1436 foreach(array_flat_leaves($array[$key]) as $_value) {
1440 $tmp[] = & $array[$key];
1444 return $unique ? array_values(array_unique($tmp)) : $tmp;
1447 // An array() to an array leaf
1448 function array_leaf($array = array('A', 'B', 'C.D'), $stem = FALSE, $edge = TRUE)
1450 if (! is_array($array)) return $array;
1454 foreach($array as $arg) {
1455 if (! is_string($arg) && ! is_int($arg)) continue;
1456 $tmp[$arg] = array();
1458 $tmp = & $tmp[$arg];
1461 $parent[key($parent)] = & $edge;
1463 $parent = key($parent);
1466 return $leaf; // array('A' => array('B' => 'C.D'))
1470 // ---------------------
1473 // Summarize $progress (blocked only)
1474 function summarize_spam_progress($progress = array(), $blockedonly = FALSE)
1477 $tmp = array_keys($progress['is_spam']);
1480 $method = & $progress['method'];
1481 if (isset($progress['sum'])) {
1482 foreach ($progress['sum'] as $key => $value) {
1483 if (isset($method[$key]) && $value) {
1484 $tmp[] = $key . '(' . $value . ')';
1490 return implode(', ', $tmp);
1493 function summarize_detail_badhost($progress = array())
1495 if (! isset($progress['blocked']) || empty($progress['blocked'])) return '';
1499 foreach($progress['blocked'] as $list => $lvalue) {
1500 foreach($lvalue as $group => $gvalue) {
1501 $flat = implode(', ', array_flat_leaves($gvalue));
1502 if ($flat === $group) {
1503 $blocked[$list][] = $flat;
1505 $blocked[$list][$group] = $flat;
1511 // From: 'A-1' => array('ie.to')
1512 // To: 'A-1' => 'ie.to'
1513 foreach($blocked as $list => $lvalue) {
1514 if (is_array($lvalue) &&
1515 count($lvalue) == 1 &&
1516 is_numeric(key($lvalue))) {
1517 $blocked[$list] = current($lvalue);
1521 return var_export_shrink($blocked, TRUE, TRUE);
1524 function summarize_detail_newtral($progress = array())
1526 if (! isset($progress['hosts']) ||
1527 ! is_array($progress['hosts']) ||
1528 empty($progress['hosts'])) return '';
1530 // Generate a responsible $trie
1532 foreach($progress['hosts'] as $value) {
1533 // 'A.foo.bar.example.com'
1534 $resp = whois_responsibility($value); // 'example.com'
1536 // One or more test, or do nothing here
1537 $resp = strval($value);
1540 $rest = rtrim(substr($value, 0, - strlen($resp)), '.'); // 'A.foo.bar'
1542 $trie = array_merge_recursive($trie, array($resp => array($rest => NULL)));
1545 // Format: var_export_shrink() -like output
1547 ksort_by_domain($trie);
1548 foreach(array_keys($trie) as $key) {
1549 ksort_by_domain($trie[$key]);
1550 if (count($trie[$key]) == 1 && key($trie[$key]) == '') {
1551 // Just one 'responsibility.example.com'
1552 $result[] = ' \'' . $key . '\',';
1554 // One subdomain-or-host, or several ones
1556 foreach(array_keys($trie[$key]) as $sub) {
1560 $subs[] = $sub . '.' . $key;
1563 $result[] = ' \'' . $key . '\' => \'' . implode(', ', $subs) . '\',';
1569 implode("\n", $result) . "\n" .
1573 // ksort() by domain
1574 function ksort_by_domain(& $array)
1577 foreach(array_keys($array) as $key) {
1578 $sort[delimiter_reverse($key)] = $key;
1580 ksort($sort, SORT_STRING);
1582 foreach($sort as $key) {
1583 $result[$key] = & $array[$key];
1588 // Check responsibility-root of the FQDN
1589 // 'foo.bar.example.com' => 'example.com' (.com has the last whois for it)
1590 // 'foo.bar.example.au' => 'example.au' (.au has the last whois for it)
1591 // 'foo.bar.example.edu.au' => 'example.edu.au' (.edu.au has the last whois for it)
1592 // 'foo.bar.example.act.edu.au' => 'example.act.edu.au' (.act.edu.au has the last whois for it)
1593 function whois_responsibility($fqdn = 'foo.bar.example.com', $parent = FALSE, $implicit = TRUE)
1597 if ($fqdn === NULL) {
1598 $domain = NULL; // Unset
1601 if (! is_string($fqdn)) return '';
1603 if (is_ip($fqdn)) return $fqdn;
1605 if (! isset($domain)) {
1607 if (file_exists(DOMAIN_INI_FILE)) {
1608 include(DOMAIN_INI_FILE); // Set
1613 $dcursor = & $domain;
1614 $array = array_reverse(explode('.', $fqdn));
1617 if (! isset($array[$i])) break;
1618 $acursor = $array[$i];
1619 if (is_array($dcursor) && isset($dcursor[$acursor])) {
1620 $result[] = & $array[$i];
1621 $dcursor = & $dcursor[$acursor];
1623 if (! $parent && isset($acursor)) {
1624 $result[] = & $array[$i]; // Whois servers must know this subdomain
1631 // Implicit responsibility: Top-Level-Domains must not be yours
1632 // 'bar.foo.something' => 'foo.something'
1633 if ($implicit && count($result) == 1 && count($array) > 1) {
1634 $result[] = & $array[1];
1637 return $result ? implode('.', array_reverse($result)) : '';
1641 // ---------------------
1645 function spam_dispose()
1647 get_blocklist(NULL);
1648 whois_responsibility(NULL);
1651 // Common bahavior for blocking
1652 // NOTE: Call this function from various blocking feature, to disgueise the reason 'why blocked'
1653 function spam_exit($mode = '', $data = array())
1662 echo('<pre>' . "\n");
1663 echo htmlspecialchars(var_export($data, TRUE));
1664 echo('</pre>' . "\n");
1668 if ($exit) exit; // Force exit
1672 // ---------------------
1675 // TODO: Record them
1676 // Simple/fast spam filter ($target: 'a string' or an array())
1677 function pkwk_spamfilter($action, $page, $target = array('title' => ''), $method = array(), $exitmode = '')
1679 $progress = check_uri_spam($target, $method);
1681 if (empty($progress['is_spam'])) {
1685 // TODO: detect encoding from $target for mbstring functions
1687 // foreach(array_keys($target) as $key) {
1688 // $tmp[strings($key, 0, FALSE, TRUE)] = strings($target[$key], 0, FALSE, TRUE); // Removing "\0" etc
1690 // $target = & $tmp;
1692 pkwk_spamnotify($action, $page, $target, $progress, $method);
1693 spam_exit($exitmode, $progress);
1697 // ---------------------
1698 // PukiWiki original
1700 // Mail to administrator(s)
1701 function pkwk_spamnotify($action, $page, $target = array('title' => ''), $progress = array(), $method = array())
1703 global $notify, $notify_subject;
1705 if (! $notify) return;
1707 $asap = isset($method['asap']);
1709 $summary['ACTION'] = 'Blocked by: ' . summarize_spam_progress($progress, TRUE);
1711 $summary['METRICS'] = summarize_spam_progress($progress);
1714 $tmp = summarize_detail_badhost($progress);
1715 if ($tmp != '') $summary['DETAIL_BADHOST'] = $tmp;
1717 $tmp = summarize_detail_newtral($progress);
1718 if (! $asap && $tmp != '') $summary['DETAIL_NEUTRAL_HOST'] = $tmp;
1720 $summary['COMMENT'] = $action;
1721 $summary['PAGE'] = '[blocked] ' . (is_pagename($page) ? $page : '');
1722 $summary['URI'] = get_script_uri() . '?' . rawurlencode($page);
1723 $summary['USER_AGENT'] = TRUE;
1724 $summary['REMOTE_ADDR'] = TRUE;
1725 pkwk_mail_notify($notify_subject, var_export($target, TRUE), $summary, TRUE);