OSDN Git Service

Simplify
[pukiwiki/pukiwiki_sandbox.git] / spam / spam.php
index 7862f27..0b2d91a 100644 (file)
@@ -1,5 +1,5 @@
 <?php
-// $Id: spam.php,v 1.132 2007/04/22 21:49:08 henoheno Exp $
+// $Id: spam.php,v 1.144 2007/05/03 15:30:46 henoheno Exp $
 // Copyright (C) 2006-2007 PukiWiki Developers Team
 // License: GPL v2 or (at your option) any later version
 //
@@ -37,11 +37,45 @@ function preg_grep_invert($pattern = '//', $input = array())
        }
 }
 
-// Very roughly strings(1)
-function strings($binary = '')
+// Roughly strings(1) using PCRE
+// This function is useful to:
+//   * Reduce the size of data, from removing unprintable binary data
+//   * Detect _bare_strings_ from binary data
+// References:
+//   http://www.freebsd.org/cgi/man.cgi?query=strings (Man-page of GNU strings)
+//   http://www.pcre.org/pcre.txt
+function strings($binary = '', $min_len = 4, $ignore_space = FALSE)
 {
-       // http://www.pcre.org/pcre.txt
-       return preg_replace('/[[:^graph:]]+/', "\n", $binary);
+       if ($ignore_space) {
+               $binary = preg_replace(
+                       array(
+                               '/(?:[^[:graph:] \t\n]|[\r])+/s',
+                               '/[ \t]{2,}/',
+                               '/^[ \t]/m',
+                               '/[ \t]$/m',
+                       ),
+                       array(
+                               "\n",
+                               ' ',
+                               '',
+                               ''
+                       ),
+                        $binary);
+       } else {
+               $binary = preg_replace('/(?:[^[:graph:][:space:]]|[\r])+/s', "\n", $binary);
+       }
+
+       if ($min_len > 1) {
+               $min_len = min(1024, intval($min_len));
+               $binary = 
+                       implode("\n",
+                               preg_grep('/^.{' . $min_len . ',}/S',
+                                       explode("\n", $binary)
+                               )
+                       );
+       }
+
+       return $binary;
 }
 
 
@@ -224,7 +258,7 @@ function area_pickup($string = '', $method = array())
        // [OK] <a href="http://nasty.example.com">visit http://nasty.example.com/</a>
        // [OK] <a href=\'http://nasty.example.com/\' >discount foobar</a> 
        // [NG] <a href="http://ng.example.com">visit http://ng.example.com _not_ended_
-       $regex = '#<a\b[^>]*\bhref\b[^>]*>.*?</a\b[^>]*(>)#i';
+       $regex = '#<a\b[^>]*\bhref\b[^>]*>.*?</a\b[^>]*(>)#is';
        if (isset($method['area_anchor'])) {
                $areas = array();
                $count = isset($method['asap']) ?
@@ -250,7 +284,7 @@ function area_pickup($string = '', $method = array())
        // [OK] [link]http://nasty.example.com/[/link]
        // [OK] [url=http://nasty.example.com]visit http://nasty.example.com/[/url]
        // [OK] [link http://nasty.example.com/]buy something[/link]
-       $regex = '#\[(url|link)\b[^\]]*\].*?\[/\1\b[^\]]*(\])#i';
+       $regex = '#\[(url|link)\b[^\]]*\].*?\[/\1\b[^\]]*(\])#is';
        if (isset($method['area_bbcode'])) {
                $areas = array();
                $count = isset($method['asap']) ?
@@ -339,15 +373,32 @@ function _preg_replace_callback_domain_exposure($matches = array())
 // Preprocess: rawurldecode() and adding space(s) and something
 // to detect/count some URIs _if possible_
 // NOTE: It's maybe danger to var_dump(result). [e.g. 'javascript:']
+// [OK] http://victim.example.org/?site:nasty.example.org
+// [OK] http://victim.example.org/nasty.example.org
 // [OK] http://victim.example.org/go?http%3A%2F%2Fnasty.example.org
 // [OK] http://victim.example.org/http://nasty.example.org
-// TODO: link.toolbot.com, urlx.org
 function spam_uri_pickup_preprocess($string = '')
 {
        if (! is_string($string)) return '';
 
        $string = rawurldecode($string);
 
+       // Domain exposure (simple)
+       // http://victim.example.org/nasty.example.org/path#frag
+       // => http://nasty.example.org/?refer=victim.example.org and original
+       $string = preg_replace(
+               '#http://' .
+               '(' .
+                       'ime\.nu' . '|' .       // 2ch.net
+                       'ime\.st' . '|' .       // 2ch.net
+                       'link\.toolbot\.com' . '|' .
+                       'urlx\.org' .
+               ')' .
+               '/([a-z0-9.%_-]+\.[a-z0-9.%_-]+)#i',    // nasty.example.org
+               'http://$2/?refer=$1 $0',                               // Preserve $0 or remove?
+               $string
+       );
+
        // Domain exposure (See _preg_replace_callback_domain_exposure())
        $string = preg_replace_callback(
                array(
@@ -931,62 +982,53 @@ function get_blocklist_add(& $array, $key = 0, $value = '*.example.org')
        }
 }
 
-function is_badhost($hosts = array(), $asap = TRUE, & $remains)
+// Blocklist metrics: Separate $host, to $blocked and not blocked
+function blocklist_distiller(& $hosts, $keys = array('goodhost', 'badhost'), $asap = FALSE)
 {
-       $result = array();
        if (! is_array($hosts)) $hosts = array($hosts);
-       foreach(array_keys($hosts) as $key) {
-               if (! is_string($hosts[$key])) {
-                       unset($hosts[$key]);
-               }
-       }
-       if (empty($hosts)) return $result;
-
-       foreach(get_blocklist('list') as $key=>$value){
-               if ($value) {
-                       foreach (get_blocklist($key) as $label => $regex) {
-                               if (is_array($regex)) {
-                                       $result[$label] = array();
-                                       foreach($regex as $_label => $_regex) {
-                                               if (is_badhost_avail($_label, $_regex, $hosts, $result[$label]) && $asap) {
-                                                       break;
-                                               }
-                                       }
-                                       if (empty($result[$label])) unset($result[$label]);
-                               } else {
-                                       if (is_badhost_avail($label, $regex, $hosts, $result) && $asap) {
-                                               break;
+       if (! is_array($keys))  $keys  = array($keys);
+
+       $list = get_blocklist('list');
+       $blocked = array();
+
+       foreach($keys as $key){
+               foreach (get_blocklist($key) as $label => $regex) {
+                       if (is_array($regex)) {
+                               foreach($regex as $_label => $_regex) {
+                                       $group = preg_grep($_regex, $hosts);
+                                       if ($group) {
+                                               $hosts = array_diff($hosts, $group);
+                                               $blocked[$key][$label][$_label] = $group;
+                                               if ($asap && $list[$key]) break;
                                        }
                                }
+                       } else {
+                               $group = preg_grep($regex, $hosts);
+                               if ($group) {
+                                       $hosts = array_diff($hosts, $group);
+                                       $blocked[$key][$label] = $group;
+                                       if ($asap && $list[$key]) break;
+                               }
                        }
-               } else {
-                       foreach (get_blocklist($key) as $regex) {
-                               $hosts = preg_grep_invert($regex, $hosts);
-                       }
-                       if (empty($hosts)) return $result;
                }
        }
 
-       $remains = $hosts;
-       return $result;
+       return $blocked;
 }
 
-// Subroutine for is_badhost()
-function is_badhost_avail($label = '*.example.org', $regex = '/^.*\.example\.org$/', & $hosts, & $result)
+// Simple example for badhost (not used now)
+function is_badhost($hosts = array(), $asap = TRUE, $bool = TRUE)
 {
-       $group = preg_grep($regex, $hosts);
-       if ($group) {
-
-               // DEBUG var_dump($group); // badhost detail
-
-               $result[$label] = & $group;
-               $hosts = array_diff($hosts, $result[$label]);
-               return TRUE;
-       } else {
-               return FALSE;
+       $list = get_blocklist('list');
+       $blocked = blocklist_distiller($hosts, array_keys($list), $asap);
+       foreach($list as $key=>$type){
+               if (! $type) unset($blocked[$key]); // Ignore goodhost etc
        }
+
+       return $bool ? ! empty($blocked) : $blocked;
 }
 
+
 // Default (enabled) methods and thresholds (for content insertion)
 function check_uri_spam_method($times = 1, $t_area = 0, $rule = TRUE)
 {
@@ -1027,59 +1069,84 @@ function check_uri_spam_method($times = 1, $t_area = 0, $rule = TRUE)
 // Simple/fast spam check
 function check_uri_spam($target = '', $method = array())
 {
-       if (! is_array($method) || empty($method)) {
-               $method = check_uri_spam_method();
-       }
+       // Return value
        $progress = array(
+               'method'  => array(
+                       // Theme to do  => Dummy, optional value, or optional array()
+                       //'quantity'    => 8,
+                       //'uniqhost'    => TRUE,
+                       //'non_uniqhost'=> 3,
+                       //'non_uniquri' => 3,
+                       //'badhost'     => TRUE,
+                       //'area_anchor' => 0,
+                       //'area_bbcode' => 0,
+                       //'uri_anchor'  => 0,
+                       //'uri_bbcode'  => 0,
+               ),
                'sum' => array(
-                       'quantity'    => 0,
-                       'uniqhost'    => 0,
-                       'non_uniqhost'=> 0,
-                       'non_uniquri' => 0,
-                       'badhost'     => 0,
-                       'area_anchor' => 0,
-                       'area_bbcode' => 0,
-                       'uri_anchor'  => 0,
-                       'uri_bbcode'  => 0,
+                       // Theme        => Volume found (int)
+               ),
+               'is_spam' => array(
+                       // Flag. If someting defined here,
+                       // one or more spam will be included
+                       // in this report
+               ),
+               'remains' => array(
                ),
-               'is_spam' => array(),
-               'method'  => & $method,
-               'remains' => array(),
-               'error'   => array(),
        );
+
+       // Aliases
        $sum     = & $progress['sum'];
        $is_spam = & $progress['is_spam'];
+       $progress['method'] = & $method;        // Argument
        $remains = & $progress['remains'];
-       $error   = & $progress['error'];
        $asap    = isset($method['asap']);
 
-       // Recurse
+       // Init
+       if (! is_array($method) || empty($method)) {
+               $method = check_uri_spam_method();
+       }
+       foreach(array_keys($method) as $key) {
+               if (! isset($sum[$key])) $sum[$key] = 0;
+       }
+
        if (is_array($target)) {
                foreach($target as $str) {
-                       // Recurse
-                       $_progress = check_uri_spam($str, $method);
-                       $_sum      = & $_progress['sum'];
-                       $_is_spam  = & $_progress['is_spam'];
-                       $_remains  = & $_progress['remains'];
-                       $_error    = & $_progress['error'];
+                       if (! is_string($str)) continue;
+
+                       $_progress = check_uri_spam($str, $method);     // Recurse
+
+                       // Merge $sum
+                       $_sum = & $_progress['sum'];
                        foreach (array_keys($_sum) as $key) {
-                               $sum[$key] += $_sum[$key];
+                               if (! isset($sum[$key])) {
+                                       $sum[$key] = & $_sum[$key];
+                               } else {
+                                       $sum[$key] += $_sum[$key];
+                               }
                        }
+
+                       // Merge $is_spam
+                       $_is_spam = & $_progress['is_spam'];
                        foreach (array_keys($_is_spam) as $key) {
                                if (is_array($_is_spam[$key])) {
                                        // Marge keys (badhost)
                                        foreach(array_keys($_is_spam[$key]) as $_key) {
                                                if (! isset($is_spam[$key][$_key])) {
-                                                       $is_spam[$key][$_key] =  $_is_spam[$key][$_key];
+                                                       $is_spam[$key][$_key] = & $_is_spam[$key][$_key];
                                                } else {
                                                        $is_spam[$key][$_key] += $_is_spam[$key][$_key];
                                                }
                                        }
                                } else {
                                        $is_spam[$key] = TRUE;
+                                       if ($asap) break;
                                }
                        }
-                       foreach ($_remains as $key=>$value) {
+                       if ($asap && $is_spam) break;
+
+                       // Merge $remains
+                       foreach ($_progress['remains'] as $key=>$value) {
                                foreach ($value as $_key=>$_value) {
                                        if (is_int($_key)) {
                                                $remains[$key][]      = $_value;
@@ -1088,8 +1155,6 @@ function check_uri_spam($target = '', $method = array())
                                        }
                                }
                        }
-                       if (! empty($_error)) $error += $_error;
-                       if ($asap && $is_spam) break;
                }
                return $progress;
        }
@@ -1125,7 +1190,6 @@ function check_uri_spam($target = '', $method = array())
 
        // URI: Pickup
        $pickups = uri_pickup_normalize(spam_uri_pickup($target, $method));
-       //$remains['uri_pickup'] = & $pickups;
 
        // Return if ...
        if (empty($pickups)) return $progress;
@@ -1199,7 +1263,6 @@ function check_uri_spam($target = '', $method = array())
        $hosts = array();
        foreach ($pickups as $pickup) $hosts[] = & $pickup['host'];
        $hosts = array_unique($hosts);
-       //$remains['uniqhost'] = & $hosts;
        $sum['uniqhost'] += count($hosts);
        if ((! $asap || ! $is_spam) && isset($method['non_uniqhost'])) {
                $sum['non_uniqhost'] = $sum['quantity'] - $sum['uniqhost'];
@@ -1211,45 +1274,56 @@ function check_uri_spam($target = '', $method = array())
        // Return if ...
        if ($asap && $is_spam) return $progress;
 
-       // URI: Bad host
+       // URI: Bad host (Separate good/bad hosts from $hosts)
        if ((! $asap || ! $is_spam) && isset($method['badhost'])) {
-               $__remains = array();
-               $badhost = is_badhost($hosts, $asap, $__remains);
-               if (! $asap) {
-                       if ($__remains) {
-                               $remains['badhost'] = array();
-                               foreach ($__remains as $value) {
-                                       $remains['badhost'][$value] = TRUE;
-                               }
+
+               // is_badhost()
+               $list = get_blocklist('list');
+               $blocked = blocklist_distiller($hosts, array_keys($list), $asap);
+               foreach($list as $key=>$type){
+                       if (! $type) unset($blocked[$key]); // Ignore goodhost etc
+               }
+               unset($list);
+
+               if (! $asap && $hosts) {
+                       $remains['badhost'] = array();
+                       foreach ($hosts as $value) {
+                               $remains['badhost'][$value] = TRUE;
                        }
                }
-               unset($__remains);
-               if (! empty($badhost)) {
-                       //var_dump($badhost);   // BADHOST detail
-                       $sum['badhost'] += array_count_leaves($badhost);
-                       foreach(array_keys($badhost) as $keys) {
+
+               if (! empty($blocked)) {
+
+                       //var_dump($blocked);   // BADHOST detail
+
+                       $sum['badhost'] += array_count_leaves($blocked);
+                       foreach(array_keys($blocked) as $keys) {
                                $is_spam['badhost'][$keys] =
-                                       array_count_leaves($badhost[$keys]);
+                                       array_count_leaves($blocked[$keys]);
                        }
-                       unset($badhost);
                }
        }
 
        return $progress;
 }
 
-// Count leaves
-function array_count_leaves($array = array(), $count_empty_array = FALSE)
+// Count leaves (A leaf = value that is not an array, or an empty array)
+function array_count_leaves($array = array(), $count_empty = FALSE)
 {
-       if (! is_array($array) || (empty($array) && $count_empty_array))
-               return 1;
+       if (! is_array($array) || (empty($array) && $count_empty)) return 1;
 
        // Recurse
-       $result = 0;
+       $count = 0;
        foreach ($array as $part) {
-               $result += array_count_leaves($part, $count_empty_array);
+               $count += array_count_leaves($part, $count_empty);
        }
-       return $result;
+       return $count;
+}
+
+// Merge two leaves
+function array_merge_leaves($array1 = array(), $array2 = array())
+{
+       return array_merge_recursive($array1, $array2);
 }
 
 // ---------------------
@@ -1276,6 +1350,26 @@ function summarize_spam_progress($progress = array(), $blockedonly = FALSE)
        return implode(', ', $tmp);
 }
 
+function summarize_detail_badhost($progress = array())
+{
+       if (! isset($progress['is_spam']['badhost'])) return '';
+
+       $badhost = array();
+       foreach($progress['is_spam']['badhost'] as $glob=>$number) {
+               $badhost[] = $glob . '(' . $number . ')';
+       }
+       return implode(', ', $badhost);
+}
+
+function summarize_detail_newtral($progress = array())
+{
+       if (! isset($progress['remains']['badhost'])) return '';
+
+       return count($progress['remains']['badhost']) .
+               ' (' . implode(', ', array_keys($progress['remains']['badhost'])) . ')';
+}
+
+
 // ---------------------
 // Exit
 
@@ -1331,23 +1425,13 @@ function pkwk_spamnotify($action, $page, $target = array('title' => ''), $progre
        if (! $asap) {
                $summary['METRICS'] = summarize_spam_progress($progress);
        }
-       if (isset($progress['is_spam']['badhost'])) {
-               $badhost = array();
-               foreach($progress['is_spam']['badhost'] as $glob=>$number) {
-                       $badhost[] = $glob . '(' . $number . ')';
-               }
-               $summary['DETAIL_BADHOST'] = implode(', ', $badhost);
-       }
-       if (! $asap && $progress['remains']['badhost']) {
-               $count = count($progress['remains']['badhost']);
-               $summary['DETAIL_NEUTRAL_HOST'] = $count .
-                       ' (' .
-                               preg_replace(
-                                       '/[^, a-z0-9.-]/i', '',
-                                       implode(', ', array_keys($progress['remains']['badhost']))
-                               ) .
-                       ')';
-       }
+
+       $tmp = summarize_detail_badhost($progress);
+       if ($tmp != '') $summary['DETAIL_BADHOST'] = $tmp;
+
+       $tmp = summarize_detail_newtral($progress);
+       if (! $asap && $tmp != '') $summary['DETAIL_NEUTRAL_HOST'] = $tmp;
+
        $summary['COMMENT'] = $action;
        $summary['PAGE']    = '[blocked] ' . (is_pagename($page) ? $page : '');
        $summary['URI']     = get_script_uri() . '?' . rawurlencode($page);