X-Git-Url: https://mop.ddnsfree.com/gitweb/?a=blobdiff_plain;f=web%2FObj%2Fcurl-de-brisk.phh;h=a78b3fcf50c7031a0d21caa0f449891fcbf1fb9c;hb=456b5daac0243fe5d6d8bbe6ea5fe434f876c66a;hp=cf4bc5282dd818b59d29ad3f2099ee51b3779da8;hpb=9d29dc1ba716f4e1eca0830060a1196c77749ec1;p=curl-de-sac.git diff --git a/web/Obj/curl-de-brisk.phh b/web/Obj/curl-de-brisk.phh index cf4bc52..a78b3fc 100755 --- a/web/Obj/curl-de-brisk.phh +++ b/web/Obj/curl-de-brisk.phh @@ -3,15 +3,61 @@ require_once($G_base . 'Obj/curl-de-sac.phh'); define('TOR_CHK_URL', 'http://localhost/curl-de-sac/test/tor_mock.ppp'); +define('PROXY_CHK_URL', 'http://localhost/curl-de-sac/test/proxy_mock.ppp'); -class tor_chk_cmd extends CDS_cmd { +/* + * Operational Brisk stuff + */ +function brisk_cds_reload($brisk) +{ + if ($brisk->cds != NULL) { + $brisk->cds->cmd_cls_deregister_all(); + unset($brisk->cds); + $brisk->cds = NULL; + } + // create cds + $brisk->cds = new Curl_de_sac(); + + // create tor_chk_cls and proxy_chk_cls + $tor_chk_cls = new Tor_chk_cmd_cls(); + $proxy_chk_cls = new Proxy_chk_cmd_cls(); + + // registrer tor_chk_cls and proxy_chk_cls + printf("MAIN: Register 'tor_chk_cls'\n"); + if (($brisk->cds->cmd_cls_register($tor_chk_cls)) == FALSE) { + fprintf(STDERR, "MAIN: 'tor_chk_cls' registration failed\n"); + return (FALSE); + } + printf("MAIN: Register 'proxy_chk_cls'\n"); + if (($brisk->cds->cmd_cls_register($proxy_chk_cls)) == FALSE) { + fprintf(STDERR, "MAIN: 'proxy_chk_cls' registration failed\n"); + return (FALSE); + } + + return (TRUE); +} + +function brisk_cds_execute($brisk, $ghost, $real_idx, $sess, $ip, $authenticate, $header) +{ + if ($brisk->cds->execute("tor_chk", $brisk, $ghost, $sess, $ip, $authenticate != FALSE, $header) == FALSE) { + log_main("cds_execute failed"); + } + if ($brisk->cds->execute("proxy_chk", $brisk, $ghost, $sess, $ip, $authenticate != FALSE, $header) == FALSE) { + log_main("cds_execute failed"); + } +} + +/* + * CDS commands stuff + */ +class Tor_chk_cmd extends CDS_cmd { var $ctx; var $user_idx; var $user_sess; var $conn_ip; var $is_auth; - function tor_chk_cmd($cmd_cls, $ch, $ctx, $user_idx, $user_sess, $conn_ip, $is_auth) + function Tor_chk_cmd($cmd_cls, $ch, $ctx, $user_idx, $user_sess, $conn_ip, $is_auth) { parent::__construct($cmd_cls, $ch); $this->ctx = $ctx; @@ -22,8 +68,8 @@ class tor_chk_cmd extends CDS_cmd { } } -class tor_chk_cmd_cls extends CDS_cmd_cls { - function tor_chk_cmd_cls() +class Tor_chk_cmd_cls extends CDS_cmd_cls { + function Tor_chk_cmd_cls() { parent::__construct("tor_chk", 10); } @@ -48,17 +94,17 @@ class tor_chk_cmd_cls extends CDS_cmd_cls { if (parent::create($cds, $ch) == FALSE) break; - $cmd = new tor_chk_cmd($this, $ch, $ctx, $user_idx, $user_sess, $conn_ip, $is_auth); + $cmd = new Tor_chk_cmd($this, $ch, $ctx, $user_idx, $user_sess, $conn_ip, $is_auth); return $cmd; } while (FALSE); - + return FALSE; } function process($cmd, $ret) { - if ($this->dbg_get() > 2) { + if ($this->dbg_get() > 2) { printf("CURL: 'tor_chk' process: curl_multi_getcontent\n"); print_r($ret); } @@ -83,15 +129,165 @@ class tor_chk_cmd_cls extends CDS_cmd_cls { ; } - $cmd->ctx->tor_chk_postprocess($cmd->user_idx, $cmd->user_sess, $cmd->conn_ip, $cmd->is_auth, $is_tor); + tor_chk_postprocess($cmd->ctx, $cmd->user_idx, $cmd->user_sess, $cmd->conn_ip, $cmd->is_auth, $is_tor); + + return TRUE; + } + + function timeout($cmd) + { + tor_chk_timeout_cb($cmd->ctx, $cmd->user_idx, $cmd->user_sess, $cmd->conn_ip, $cmd->is_auth); + } +} + +class Proxy_chk_cmd extends CDS_cmd { + var $ctx; + var $user_idx; + var $user_sess; + var $conn_ip; + var $is_auth; + + function Proxy_chk_cmd($cmd_cls, $ch, $ctx, $user_idx, $user_sess, $conn_ip, $is_auth) + { + parent::__construct($cmd_cls, $ch); + $this->ctx = $ctx; + $this->user_idx = $user_idx; + $this->user_sess = $user_sess; + $this->conn_ip = $conn_ip; + $this->is_auth = $is_auth; + } +} + +class Proxy_chk_cmd_cls extends CDS_cmd_cls { + function Proxy_chk_cmd_cls() + { + parent::__construct("proxy_chk", 10); + + $this->scan_headers = array( + 'HTTP_VIA', + 'HTTP_X_FORWARDED_FOR', + 'HTTP_FORWARDED_FOR', + 'HTTP_X_FORWARDED', + 'HTTP_FORWARDED', + 'HTTP_CLIENT_IP', + 'HTTP_FORWARDED_FOR_IP', + 'VIA', + 'X_FORWARDED_FOR', + 'FORWARDED_FOR', + 'X_FORWARDED', + 'FORWARDED', + 'CLIENT_IP', + 'FORWARDED_FOR_IP', + 'HTTP_PROXY_CONNECTION' + ); + } + + function create($cds, $ctx, $user_idx, $user_sess, $conn_ip, $is_auth, $headers) + { + if ($cds->dbg_get() > 0) { + printf("'proxy_chk'::create url:[%s]\n", 'PROXY_CHK_URL'); + } + + foreach($this->scan_headers as $key){ + //proxy detected? lets log... + if(array_key_exists($key, $headers)) { + // we already are behind a PROXY, this are our headers + if ($key == 'X-Proxy-ID') { + if ($headers[$key] == '860705422') + continue; + } + else if ($key == 'X-Forwarded-For') { + if ($headers[$key] == '172.16.9.66') + continue; + } + else if ($key == 'Via') { + if ($headers[$key] == '1.1 172.16.8.1 (Mikrotik HttpProxy)') + continue; + } + + proxy_chk_postprocess($ctx, $user_idx, $user_sess, $conn_ip, $is_auth, TRUE); + return TRUE; + } + } + + do { + $opts = array( CURLOPT_HEADER => 0, + CURLOPT_RETURNTRANSFER => 1, + CURLOPT_FORBID_REUSE => true, + CURLOPT_HTTPHEADER => array('Connection: close'), + CURLOPT_POST => true, + CURLOPT_POSTFIELDS => array('conn_ip' => $conn_ip)); + + if (($ch = parent::pre_create($cds, PROXY_CHK_URL, $opts)) == FALSE) + break; + + if (parent::create($cds, $ch) == FALSE) + break; + + $cmd = new Proxy_chk_cmd($this, $ch, $ctx, $user_idx, $user_sess, $conn_ip, $is_auth); + + return $cmd; + } while (FALSE); + + return FALSE; + } + + function process($cmd, $ret) + { + if ($this->dbg_get() > 2) { + printf("CURL: 'proxy_chk' process: curl_multi_getcontent\n"); + print_r($ret); + } + + $content = curl_multi_getcontent($cmd->ch_get()); + if ($this->dbg_get() > 0) { printf("'proxy_chk' process: [%s]\n", $content); } + + $is_proxy = FALSE; + if (mb_strpos($content, "is_proxy=true", 0, "UTF-8") !== FALSE) { + // printf("WARNING: stripos ok\n"); + $is_proxy = TRUE; + } + else if (mb_strpos($content, "is_proxy=false", 0, "UTF-8") === FALSE) { + printf("WARNING: proxy check disabled\n"); + } + else { + // printf("WARNING: NOT an active Proxy server on IP [%s]\n", $cmd->conn_ip); + ; + } + + proxy_chk_postprocess($cmd->ctx, $cmd->user_idx, $cmd->user_sess, $cmd->conn_ip, $cmd->is_auth, $is_proxy); return TRUE; } function timeout($cmd) { - printf("'tor_chk' timeout function reached\n"); + proxy_chk_timeout_cb($cmd->ctx, $cmd->user_idx, $cmd->user_sess, $cmd->conn_ip, $cmd->is_auth); } } -?> \ No newline at end of file +function tor_chk_postprocess($brisk, $user_idx, $user_sess, $conn_ip, $is_auth, $is_tor) +{ + log_cds(sprintf("tor: user_idx: %d, user_sess: %s, conn_ip: %s, is_auth: %s, is_tor: %s", + $user_idx, $user_sess, $conn_ip, ($is_auth ? "YES" : "NO"), ($is_tor ? "YES" : "NO"))); +} + +function tor_chk_timeout_cb($brisk, $user_idx, $user_sess, $conn_ip, $is_auth) +{ + log_cds(sprintf("tor: user_idx: %d, user_sess: %s, conn_ip: %s, is_auth: %s", + $user_idx, $user_sess, $conn_ip, ($is_auth ? "YES" : "NO"))); +} + +function proxy_chk_postprocess($brisk, $user_idx, $user_sess, $conn_ip, $is_auth, $is_proxy) +{ + log_cds(sprintf("proxy: user_idx: %d, user_sess: %s, conn_ip: %s, is_auth: %s, is_proxy: %s", + $user_idx, $user_sess, $conn_ip, ($is_auth ? "YES" : "NO"), ($is_proxy ? "YES" : "NO"))); +} + +function proxy_chk_timeout_cb($brisk, $user_idx, $user_sess, $conn_ip, $is_auth) +{ + log_cds(sprintf("proxy timeout: user_idx: %d, user_sess: %s, conn_ip: %s, is_auth: %s", + $user_idx, $user_sess, $conn_ip, ($is_auth ? "YES" : "NO"))); +} + +?>