xref: /dokuwiki/inc/Ip.php (revision 2f70db90a6d48ecf1f6af51603dba5a630662d2a)
1c7f6b7b7SZebra North<?php
2c7f6b7b7SZebra North
3c7f6b7b7SZebra North/**
433cb4e01SAndreas Gohr * DokuWiki IP address and reverse proxy functions.
5c7f6b7b7SZebra North *
6c7f6b7b7SZebra North * @license    GPL 2 (http://www.gnu.org/licenses/gpl.html)
7c7f6b7b7SZebra North * @author     Zebra North <mrzebra@mrzebra.co.uk>
8c7f6b7b7SZebra North */
9c7f6b7b7SZebra North
10c7f6b7b7SZebra Northnamespace dokuwiki;
11c7f6b7b7SZebra North
12e449acd0SAndreas Gohruse dokuwiki\Input\Input;
1391da8d44SWillForanuse dokuwiki\Ip32;
14c7f6b7b7SZebra Northuse Exception;
15c7f6b7b7SZebra North
16c7f6b7b7SZebra Northclass Ip
17c7f6b7b7SZebra North{
18c7f6b7b7SZebra North    /**
19c7f6b7b7SZebra North     * Determine whether an IP address is within a given CIDR range.
20c7f6b7b7SZebra North     * The needle and haystack may be either IPv4 or IPv6.
21c7f6b7b7SZebra North     *
22c7f6b7b7SZebra North     * Example:
23c7f6b7b7SZebra North     *
24c7f6b7b7SZebra North     * ipInRange('192.168.11.123', '192.168.0.0/16') === true
25c7f6b7b7SZebra North     * ipInRange('192.168.11.123', '::192.168.0.0/80') === true
26c7f6b7b7SZebra North     * ipInRange('::192.168.11.123', '192.168.0.0/16') === true
27c7f6b7b7SZebra North     * ipInRange('::192.168.11.123', '::192.168.0.0/80') === true
28c7f6b7b7SZebra North     *
29e449acd0SAndreas Gohr     * @param string $needle The IP to test, either IPv4 in dotted decimal
30c7f6b7b7SZebra North     *                         notation or IPv6 in colon notation.
31c7f6b7b7SZebra North     * @param string $haystack The CIDR range as an IP followed by a forward
32c7f6b7b7SZebra North     *                         slash and the number of significant bits.
33c7f6b7b7SZebra North     *
34c7f6b7b7SZebra North     * @return bool Returns true if $needle is within the range specified
35c7f6b7b7SZebra North     *              by $haystack, false if it is outside the range.
36c7f6b7b7SZebra North     *
37c7f6b7b7SZebra North     * @throws Exception Thrown if $needle is not a valid IP address.
38c7f6b7b7SZebra North     * @throws Exception Thrown if $haystack is not a valid IP range.
39c7f6b7b7SZebra North     */
40c7f6b7b7SZebra North    public static function ipInRange(string $needle, string $haystack): bool
41c7f6b7b7SZebra North    {
42c7f6b7b7SZebra North        $range = explode('/', $haystack);
43c7f6b7b7SZebra North        $networkIp = Ip::ipToNumber($range[0]);
44c7f6b7b7SZebra North        $maskLength = $range[1];
45c7f6b7b7SZebra North
46c7f6b7b7SZebra North        // For an IPv4 address the top 96 bits must be zero.
47c7f6b7b7SZebra North        if ($networkIp['version'] === 4) {
48c7f6b7b7SZebra North            $maskLength += 96;
49c7f6b7b7SZebra North        }
50c7f6b7b7SZebra North
51c7f6b7b7SZebra North        if ($maskLength > 128) {
52c7f6b7b7SZebra North            throw new Exception('Invalid IP range mask: ' . $haystack);
53c7f6b7b7SZebra North        }
54c7f6b7b7SZebra North
55c7f6b7b7SZebra North
56c7f6b7b7SZebra North        $needle = Ip::ipToNumber($needle);
57c7f6b7b7SZebra North
5825a70af9SWillForan        $maskLengthUpper = min($maskLength, 64);
5925a70af9SWillForan        $maskLengthLower = max(0, $maskLength - 64);
6025a70af9SWillForan
6125a70af9SWillForan        if (PHP_INT_SIZE == 4) {
62a060f5a0SWillForan            $needle_up = Ip32::bitmask64On32($needle['upper'],    $maskLengthUpper);
63a060f5a0SWillForan            $net_up    = Ip32::bitmask64On32($networkIp['upper'], $maskLengthUpper);
64a060f5a0SWillForan            $needle_lo = Ip32::bitmask64On32($needle['lower'],    $maskLengthLower);
65a060f5a0SWillForan            $net_lo    = Ip32::bitmask64On32($networkIp['lower'], $maskLengthLower);
6625a70af9SWillForan        } else {
6725a70af9SWillForan            $maskUpper = ~0 << intval(64 - $maskLengthUpper);
6825a70af9SWillForan            $maskLower = ~0 << intval(64 - $maskLengthLower);
6925a70af9SWillForan
7025a70af9SWillForan            $needle_up = $needle['upper'] & $maskUpper;
7125a70af9SWillForan            $net_up    = $networkIp['upper'] & $maskUpper;
7225a70af9SWillForan            $needle_lo = $needle['lower'] & $maskLower;
7325a70af9SWillForan            $net_lo    = $networkIp['lower'] & $maskLower;
7425a70af9SWillForan        }
7525a70af9SWillForan
7625a70af9SWillForan        return $needle_up === $net_up && $needle_lo === $net_lo;
7725a70af9SWillForan    }
7825a70af9SWillForan
7925a70af9SWillForan    /**
80c7f6b7b7SZebra North     * Convert an IP address from a string to a number.
81c7f6b7b7SZebra North     *
82c7f6b7b7SZebra North     * This splits 128 bit IP addresses into the upper and lower 64 bits, and
83c7f6b7b7SZebra North     * also returns whether the IP given was IPv4 or IPv6.
84c7f6b7b7SZebra North     *
85c7f6b7b7SZebra North     * The returned array contains:
86c7f6b7b7SZebra North     *
87c7f6b7b7SZebra North     *  - version: Either '4' or '6'.
88c7f6b7b7SZebra North     *  - upper: The upper 64 bits of the IP.
89c7f6b7b7SZebra North     *  - lower: The lower 64 bits of the IP.
90c7f6b7b7SZebra North     *
91c7f6b7b7SZebra North     * For an IPv4 address, 'upper' will always be zero.
92c7f6b7b7SZebra North     *
93e449acd0SAndreas Gohr     * @param string $ip The IPv4 or IPv6 address.
94c7f6b7b7SZebra North     *
95c7f6b7b7SZebra North     * @return int[] Returns an array of 'version', 'upper', 'lower'.
96c7f6b7b7SZebra North     *
97c7f6b7b7SZebra North     * @throws Exception Thrown if the IP is not valid.
98c7f6b7b7SZebra North     */
99c7f6b7b7SZebra North    public static function ipToNumber(string $ip): array
100c7f6b7b7SZebra North    {
101c7f6b7b7SZebra North        $binary = inet_pton($ip);
102c7f6b7b7SZebra North
103c7f6b7b7SZebra North        if ($binary === false) {
104c7f6b7b7SZebra North            throw new Exception('Invalid IP: ' . $ip);
105c7f6b7b7SZebra North        }
106c7f6b7b7SZebra North
107c7f6b7b7SZebra North        if (strlen($binary) === 4) {
108c7f6b7b7SZebra North            // IPv4.
109*2f70db90SWillForan            $ipNum = unpack('Nip', $binary)['ip'];
110*2f70db90SWillForan            if (PHP_INT_SIZE == 4) {
111*2f70db90SWillForan                // integer overlfow on 32bit: negative even though 'N'=unsigned
112*2f70db90SWillForan                $ipNum = ($ipNum < 0)? bcadd($ipNum, Ip32::$b32) : (string)$ipNum;
113*2f70db90SWillForan            }
114c7f6b7b7SZebra North            return [
115c7f6b7b7SZebra North                'version' => 4,
116c7f6b7b7SZebra North                'upper' => 0,
117*2f70db90SWillForan                'lower' => $ipNum,
118c7f6b7b7SZebra North            ];
119c7f6b7b7SZebra North        } else {
120da569c7fSWillForan            // IPv6. strlen==16
121*2f70db90SWillForan            if(PHP_INT_SIZE == 4) { // 32-bit
122a060f5a0SWillForan               $result = Ip32::ipv6UpperLowerOn32($binary);
123*2f70db90SWillForan            } else { // 64-bit arch
124*2f70db90SWillForan               $result = unpack('Jupper/Jlower', $binary);
125c9e618caSWillForan            }
126c7f6b7b7SZebra North            $result['version'] = 6;
127c7f6b7b7SZebra North            return $result;
128c7f6b7b7SZebra North        }
129c7f6b7b7SZebra North    }
130c7f6b7b7SZebra North
131c7f6b7b7SZebra North    /**
132c7f6b7b7SZebra North     * Determine if an IP address is equal to another IP or within an IP range.
133c7f6b7b7SZebra North     * IPv4 and IPv6 are supported.
134c7f6b7b7SZebra North     *
135c7f6b7b7SZebra North     * @param string $ip The address to test.
136c7f6b7b7SZebra North     * @param string $ipOrRange An IP address or CIDR range.
137c7f6b7b7SZebra North     *
138c7f6b7b7SZebra North     * @return bool Returns true if the IP matches, false if not.
139c7f6b7b7SZebra North     */
140c7f6b7b7SZebra North    public static function ipMatches(string $ip, string $ipOrRange): bool
141c7f6b7b7SZebra North    {
142c7f6b7b7SZebra North        try {
143c7f6b7b7SZebra North            // If it's not a range, compare the addresses directly.
144c7f6b7b7SZebra North            // Addresses are converted to numbers because the same address may be
145c7f6b7b7SZebra North            // represented by different strings, e.g. "::1" and "::0001".
146c7f6b7b7SZebra North            if (strpos($ipOrRange, '/') === false) {
147c7f6b7b7SZebra North                return Ip::ipToNumber($ip) === Ip::ipToNumber($ipOrRange);
148c7f6b7b7SZebra North            }
149c7f6b7b7SZebra North
150c7f6b7b7SZebra North            return Ip::ipInRange($ip, $ipOrRange);
151c7f6b7b7SZebra North        } catch (Exception $ex) {
152c7f6b7b7SZebra North            // The IP address was invalid.
153c7f6b7b7SZebra North            return false;
154c7f6b7b7SZebra North        }
155c7f6b7b7SZebra North    }
156c7f6b7b7SZebra North
157c7f6b7b7SZebra North    /**
158c7f6b7b7SZebra North     * Given the IP address of a proxy server, determine whether it is
159c7f6b7b7SZebra North     * a known and trusted server.
160c7f6b7b7SZebra North     *
16119d5ba27SAndreas Gohr     * This test is performed using the config value `trustedproxies`.
162c7f6b7b7SZebra North     *
163c7f6b7b7SZebra North     * @param string $ip The IP address of the proxy.
164c7f6b7b7SZebra North     *
165c7f6b7b7SZebra North     * @return bool Returns true if the IP is trusted as a proxy.
166c7f6b7b7SZebra North     */
167c7f6b7b7SZebra North    public static function proxyIsTrusted(string $ip): bool
168c7f6b7b7SZebra North    {
169c7f6b7b7SZebra North        global $conf;
170c7f6b7b7SZebra North
171c7f6b7b7SZebra North        // If the configuration is empty then no proxies are trusted.
17219d5ba27SAndreas Gohr        if (empty($conf['trustedproxies'])) {
173c7f6b7b7SZebra North            return false;
174c7f6b7b7SZebra North        }
175c7f6b7b7SZebra North
17619d5ba27SAndreas Gohr        foreach ((array)$conf['trustedproxies'] as $trusted) {
177c7f6b7b7SZebra North            if (Ip::ipMatches($ip, $trusted)) {
178ced0b55fSAndreas Gohr                return true; // The given IP matches one of the trusted proxies.
179c7f6b7b7SZebra North            }
180c7f6b7b7SZebra North        }
181c7f6b7b7SZebra North
182ced0b55fSAndreas Gohr        return false; // none of the proxies matched
183c7f6b7b7SZebra North    }
184c7f6b7b7SZebra North
185c7f6b7b7SZebra North    /**
186c7f6b7b7SZebra North     * Get the originating IP address and the address of every proxy that the
187c7f6b7b7SZebra North     * request has passed through, according to the X-Forwarded-For header.
188c7f6b7b7SZebra North     *
189c7f6b7b7SZebra North     * To prevent spoofing of the client IP, every proxy listed in the
190c7f6b7b7SZebra North     * X-Forwarded-For header must be trusted, as well as the TCP/IP endpoint
191c7f6b7b7SZebra North     * from which the connection was received (i.e. the final proxy).
192c7f6b7b7SZebra North     *
193c7f6b7b7SZebra North     * If the header is not present or contains an untrusted proxy then
194c7f6b7b7SZebra North     * an empty array is returned.
195c7f6b7b7SZebra North     *
196c7f6b7b7SZebra North     * The client IP is the first entry in the returned list, followed by the
197c7f6b7b7SZebra North     * proxies.
198c7f6b7b7SZebra North     *
199c7f6b7b7SZebra North     * @return string[] Returns an array of IP addresses.
200c7f6b7b7SZebra North     */
201c7f6b7b7SZebra North    public static function forwardedFor(): array
202c7f6b7b7SZebra North    {
203c7f6b7b7SZebra North        /* @var Input $INPUT */
204c7f6b7b7SZebra North        global $INPUT, $conf;
205c7f6b7b7SZebra North
206c7f6b7b7SZebra North        $forwardedFor = $INPUT->server->str('HTTP_X_FORWARDED_FOR');
207c7f6b7b7SZebra North
208ced0b55fSAndreas Gohr        if (empty($conf['trustedproxies']) || !$forwardedFor) {
209c7f6b7b7SZebra North            return [];
210c7f6b7b7SZebra North        }
211c7f6b7b7SZebra North
212c7f6b7b7SZebra North        // This is the address from which the header was received.
213c7f6b7b7SZebra North        $remoteAddr = $INPUT->server->str('REMOTE_ADDR');
214c7f6b7b7SZebra North
215c7f6b7b7SZebra North        // Get the client address from the X-Forwarded-For header.
216c7f6b7b7SZebra North        // X-Forwarded-For: <client> [, <proxy>]...
217c7f6b7b7SZebra North        $forwardedFor = explode(',', str_replace(' ', '', $forwardedFor));
218c7f6b7b7SZebra North
219c7f6b7b7SZebra North        // The client address is the first item, remove it from the list.
220c7f6b7b7SZebra North        $clientAddress = array_shift($forwardedFor);
221c7f6b7b7SZebra North
222c7f6b7b7SZebra North        // The remaining items are the proxies through which the X-Forwarded-For
223c7f6b7b7SZebra North        // header has passed.  The final proxy is the connection's remote address.
224c7f6b7b7SZebra North        $proxies = $forwardedFor;
225c7f6b7b7SZebra North        $proxies[] = $remoteAddr;
226c7f6b7b7SZebra North
227c7f6b7b7SZebra North        // Ensure that every proxy is trusted.
228c7f6b7b7SZebra North        foreach ($proxies as $proxy) {
229c7f6b7b7SZebra North            if (!Ip::proxyIsTrusted($proxy)) {
230c7f6b7b7SZebra North                return [];
231c7f6b7b7SZebra North            }
232c7f6b7b7SZebra North        }
233c7f6b7b7SZebra North
234c7f6b7b7SZebra North        // Add the client address before the list of proxies.
235c7f6b7b7SZebra North        return array_merge([$clientAddress], $proxies);
236c7f6b7b7SZebra North    }
237c7f6b7b7SZebra North
238c7f6b7b7SZebra North    /**
239c7f6b7b7SZebra North     * Return the IP of the client.
240c7f6b7b7SZebra North     *
241c7f6b7b7SZebra North     * The IP is sourced from, in order of preference:
242c7f6b7b7SZebra North     *
243c7f6b7b7SZebra North     *   - The X-Real-IP header if $conf[realip] is true.
244c7f6b7b7SZebra North     *   - The X-Forwarded-For header if all the proxies are trusted by $conf[trustedproxy].
245c7f6b7b7SZebra North     *   - The TCP/IP connection remote address.
246c7f6b7b7SZebra North     *   - 0.0.0.0 if all else fails.
247c7f6b7b7SZebra North     *
248c7f6b7b7SZebra North     * The 'realip' config value should only be set to true if the X-Real-IP header
249c7f6b7b7SZebra North     * is being added by the web server, otherwise it may be spoofed by the client.
250c7f6b7b7SZebra North     *
251c7f6b7b7SZebra North     * The 'trustedproxy' setting must not allow any IP, otherwise the X-Forwarded-For
252c7f6b7b7SZebra North     * may be spoofed by the client.
253c7f6b7b7SZebra North     *
254c7f6b7b7SZebra North     * @return string Returns an IPv4 or IPv6 address.
255c7f6b7b7SZebra North     */
256c7f6b7b7SZebra North    public static function clientIp(): string
257c7f6b7b7SZebra North    {
258c7f6b7b7SZebra North        return Ip::clientIps()[0];
259c7f6b7b7SZebra North    }
260c7f6b7b7SZebra North
261c7f6b7b7SZebra North    /**
262c7f6b7b7SZebra North     * Return the IP of the client and the proxies through which the connection has passed.
263c7f6b7b7SZebra North     *
264c7f6b7b7SZebra North     * The IPs are sourced from, in order of preference:
265c7f6b7b7SZebra North     *
266c7f6b7b7SZebra North     *   - The X-Real-IP header if $conf[realip] is true.
26719d5ba27SAndreas Gohr     *   - The X-Forwarded-For header if all the proxies are trusted by $conf[trustedproxies].
268c7f6b7b7SZebra North     *   - The TCP/IP connection remote address.
269c7f6b7b7SZebra North     *   - 0.0.0.0 if all else fails.
270c7f6b7b7SZebra North     *
271c7f6b7b7SZebra North     * @return string[] Returns an array of IPv4 or IPv6 addresses.
272c7f6b7b7SZebra North     */
273c7f6b7b7SZebra North    public static function clientIps(): array
274c7f6b7b7SZebra North    {
275c7f6b7b7SZebra North        /* @var Input $INPUT */
276c7f6b7b7SZebra North        global $INPUT, $conf;
277c7f6b7b7SZebra North
278c7f6b7b7SZebra North        // IPs in order of most to least preferred.
279c7f6b7b7SZebra North        $ips = [];
280c7f6b7b7SZebra North
281c7f6b7b7SZebra North        // Use the X-Real-IP header if it is enabled by the configuration.
282c7f6b7b7SZebra North        if (!empty($conf['realip']) && $INPUT->server->str('HTTP_X_REAL_IP')) {
283c7f6b7b7SZebra North            $ips[] = $INPUT->server->str('HTTP_X_REAL_IP');
284c7f6b7b7SZebra North        }
285c7f6b7b7SZebra North
286c7f6b7b7SZebra North        // Add the X-Forwarded-For addresses if all proxies are trusted.
287c7f6b7b7SZebra North        $ips = array_merge($ips, Ip::forwardedFor());
288c7f6b7b7SZebra North
289c7f6b7b7SZebra North        // Add the TCP/IP connection endpoint.
290c7f6b7b7SZebra North        $ips[] = $INPUT->server->str('REMOTE_ADDR');
291c7f6b7b7SZebra North
292c7f6b7b7SZebra North        // Remove invalid IPs.
293e449acd0SAndreas Gohr        $ips = array_filter($ips, static fn($ip) => filter_var($ip, FILTER_VALIDATE_IP));
294c7f6b7b7SZebra North
295c7f6b7b7SZebra North        // Remove duplicated IPs.
296c7f6b7b7SZebra North        $ips = array_values(array_unique($ips));
297c7f6b7b7SZebra North
298c7f6b7b7SZebra North        // Add a fallback if for some reason there were no valid IPs.
299c7f6b7b7SZebra North        if (!$ips) {
300c7f6b7b7SZebra North            $ips[] = '0.0.0.0';
301c7f6b7b7SZebra North        }
302c7f6b7b7SZebra North
303c7f6b7b7SZebra North        return $ips;
304c7f6b7b7SZebra North    }
30533cb4e01SAndreas Gohr
30633cb4e01SAndreas Gohr    /**
30733cb4e01SAndreas Gohr     * Get the host name of the server.
30833cb4e01SAndreas Gohr     *
30933cb4e01SAndreas Gohr     * The host name is sourced from, in order of preference:
31033cb4e01SAndreas Gohr     *
31133cb4e01SAndreas Gohr     *   - The X-Forwarded-Host header if it exists and the proxies are trusted.
31233cb4e01SAndreas Gohr     *   - The HTTP_HOST header.
31333cb4e01SAndreas Gohr     *   - The SERVER_NAME header.
31433cb4e01SAndreas Gohr     *   - The system's host name.
31533cb4e01SAndreas Gohr     *
31633cb4e01SAndreas Gohr     * @return string Returns the host name of the server.
31733cb4e01SAndreas Gohr     */
31833cb4e01SAndreas Gohr    public static function hostName(): string
31933cb4e01SAndreas Gohr    {
32033cb4e01SAndreas Gohr        /* @var Input $INPUT */
32133cb4e01SAndreas Gohr        global $INPUT;
32233cb4e01SAndreas Gohr
3237caad012SAndreas Gohr        $remoteAddr = $INPUT->server->str('REMOTE_ADDR');
3247caad012SAndreas Gohr        if ($INPUT->server->str('HTTP_X_FORWARDED_HOST') && self::proxyIsTrusted($remoteAddr)) {
32533cb4e01SAndreas Gohr            return $INPUT->server->str('HTTP_X_FORWARDED_HOST');
32633cb4e01SAndreas Gohr        } elseif ($INPUT->server->str('HTTP_HOST')) {
32733cb4e01SAndreas Gohr            return $INPUT->server->str('HTTP_HOST');
32833cb4e01SAndreas Gohr        } elseif ($INPUT->server->str('SERVER_NAME')) {
32933cb4e01SAndreas Gohr            return $INPUT->server->str('SERVER_NAME');
33033cb4e01SAndreas Gohr        } else {
33133cb4e01SAndreas Gohr            return php_uname('n');
33233cb4e01SAndreas Gohr        }
33333cb4e01SAndreas Gohr    }
33433cb4e01SAndreas Gohr
33533cb4e01SAndreas Gohr    /**
33633cb4e01SAndreas Gohr     * Is the connection using the HTTPS protocol?
33733cb4e01SAndreas Gohr     *
33833cb4e01SAndreas Gohr     * Will use the X-Forwarded-Proto header if it exists and the proxies are trusted, otherwise
33933cb4e01SAndreas Gohr     * the HTTPS environment is used.
34033cb4e01SAndreas Gohr     *
34133cb4e01SAndreas Gohr     * @return bool
34233cb4e01SAndreas Gohr     */
34333cb4e01SAndreas Gohr    public static function isSsl(): bool
34433cb4e01SAndreas Gohr    {
34533cb4e01SAndreas Gohr        /* @var Input $INPUT */
34633cb4e01SAndreas Gohr        global $INPUT;
34733cb4e01SAndreas Gohr
3487caad012SAndreas Gohr        $remoteAddr = $INPUT->server->str('REMOTE_ADDR');
3497caad012SAndreas Gohr        if ($INPUT->server->has('HTTP_X_FORWARDED_PROTO') && self::proxyIsTrusted($remoteAddr)) {
35033cb4e01SAndreas Gohr            return $INPUT->server->str('HTTP_X_FORWARDED_PROTO') === 'https';
35133cb4e01SAndreas Gohr        }
3527caad012SAndreas Gohr        return !preg_match('/^(|off|false|disabled)$/i', $INPUT->server->str('HTTPS', 'off'));
35333cb4e01SAndreas Gohr    }
354c7f6b7b7SZebra North}
355