1c7f6b7b7SZebra North<?php 2c7f6b7b7SZebra North 3c7f6b7b7SZebra North/** 433cb4e01SAndreas Gohr * DokuWiki IP address and reverse proxy functions. 5c7f6b7b7SZebra North * 6c7f6b7b7SZebra North * @license GPL 2 (http://www.gnu.org/licenses/gpl.html) 7c7f6b7b7SZebra North * @author Zebra North <mrzebra@mrzebra.co.uk> 8c7f6b7b7SZebra North */ 9c7f6b7b7SZebra North 10c7f6b7b7SZebra Northnamespace dokuwiki; 11c7f6b7b7SZebra North 12e449acd0SAndreas Gohruse dokuwiki\Input\Input; 1391da8d44SWillForanuse dokuwiki\Ip32; 14c7f6b7b7SZebra Northuse Exception; 15c7f6b7b7SZebra North 16c7f6b7b7SZebra Northclass Ip 17c7f6b7b7SZebra North{ 18c7f6b7b7SZebra North /** 19c7f6b7b7SZebra North * Determine whether an IP address is within a given CIDR range. 20c7f6b7b7SZebra North * The needle and haystack may be either IPv4 or IPv6. 21c7f6b7b7SZebra North * 22c7f6b7b7SZebra North * Example: 23c7f6b7b7SZebra North * 24c7f6b7b7SZebra North * ipInRange('192.168.11.123', '192.168.0.0/16') === true 25c7f6b7b7SZebra North * ipInRange('192.168.11.123', '::192.168.0.0/80') === true 26c7f6b7b7SZebra North * ipInRange('::192.168.11.123', '192.168.0.0/16') === true 27c7f6b7b7SZebra North * ipInRange('::192.168.11.123', '::192.168.0.0/80') === true 28c7f6b7b7SZebra North * 29e449acd0SAndreas Gohr * @param string $needle The IP to test, either IPv4 in dotted decimal 30c7f6b7b7SZebra North * notation or IPv6 in colon notation. 31c7f6b7b7SZebra North * @param string $haystack The CIDR range as an IP followed by a forward 32c7f6b7b7SZebra North * slash and the number of significant bits. 33c7f6b7b7SZebra North * 34c7f6b7b7SZebra North * @return bool Returns true if $needle is within the range specified 35c7f6b7b7SZebra North * by $haystack, false if it is outside the range. 36c7f6b7b7SZebra North * 37c7f6b7b7SZebra North * @throws Exception Thrown if $needle is not a valid IP address. 38c7f6b7b7SZebra North * @throws Exception Thrown if $haystack is not a valid IP range. 39c7f6b7b7SZebra North */ 40c7f6b7b7SZebra North public static function ipInRange(string $needle, string $haystack): bool 41c7f6b7b7SZebra North { 42c7f6b7b7SZebra North $range = explode('/', $haystack); 43c7f6b7b7SZebra North $networkIp = Ip::ipToNumber($range[0]); 44c7f6b7b7SZebra North $maskLength = $range[1]; 45c7f6b7b7SZebra North 46c7f6b7b7SZebra North // For an IPv4 address the top 96 bits must be zero. 47c7f6b7b7SZebra North if ($networkIp['version'] === 4) { 48c7f6b7b7SZebra North $maskLength += 96; 49c7f6b7b7SZebra North } 50c7f6b7b7SZebra North 51c7f6b7b7SZebra North if ($maskLength > 128) { 52c7f6b7b7SZebra North throw new Exception('Invalid IP range mask: ' . $haystack); 53c7f6b7b7SZebra North } 54c7f6b7b7SZebra North 55c7f6b7b7SZebra North 56c7f6b7b7SZebra North $needle = Ip::ipToNumber($needle); 57c7f6b7b7SZebra North 5825a70af9SWillForan $maskLengthUpper = min($maskLength, 64); 5925a70af9SWillForan $maskLengthLower = max(0, $maskLength - 64); 6025a70af9SWillForan 6125a70af9SWillForan if (PHP_INT_SIZE == 4) { 62a060f5a0SWillForan $needle_up = Ip32::bitmask64On32($needle['upper'], $maskLengthUpper); 63a060f5a0SWillForan $net_up = Ip32::bitmask64On32($networkIp['upper'], $maskLengthUpper); 64a060f5a0SWillForan $needle_lo = Ip32::bitmask64On32($needle['lower'], $maskLengthLower); 65a060f5a0SWillForan $net_lo = Ip32::bitmask64On32($networkIp['lower'], $maskLengthLower); 6625a70af9SWillForan } else { 6725a70af9SWillForan $maskUpper = ~0 << intval(64 - $maskLengthUpper); 6825a70af9SWillForan $maskLower = ~0 << intval(64 - $maskLengthLower); 6925a70af9SWillForan 7025a70af9SWillForan $needle_up = $needle['upper'] & $maskUpper; 7125a70af9SWillForan $net_up = $networkIp['upper'] & $maskUpper; 7225a70af9SWillForan $needle_lo = $needle['lower'] & $maskLower; 7325a70af9SWillForan $net_lo = $networkIp['lower'] & $maskLower; 7425a70af9SWillForan } 7525a70af9SWillForan 7625a70af9SWillForan return $needle_up === $net_up && $needle_lo === $net_lo; 7725a70af9SWillForan } 7825a70af9SWillForan 7925a70af9SWillForan /** 80c7f6b7b7SZebra North * Convert an IP address from a string to a number. 81c7f6b7b7SZebra North * 82c7f6b7b7SZebra North * This splits 128 bit IP addresses into the upper and lower 64 bits, and 83c7f6b7b7SZebra North * also returns whether the IP given was IPv4 or IPv6. 84c7f6b7b7SZebra North * 85c7f6b7b7SZebra North * The returned array contains: 86c7f6b7b7SZebra North * 87c7f6b7b7SZebra North * - version: Either '4' or '6'. 88c7f6b7b7SZebra North * - upper: The upper 64 bits of the IP. 89c7f6b7b7SZebra North * - lower: The lower 64 bits of the IP. 90c7f6b7b7SZebra North * 91c7f6b7b7SZebra North * For an IPv4 address, 'upper' will always be zero. 92c7f6b7b7SZebra North * 93e449acd0SAndreas Gohr * @param string $ip The IPv4 or IPv6 address. 94c7f6b7b7SZebra North * 95c7f6b7b7SZebra North * @return int[] Returns an array of 'version', 'upper', 'lower'. 96c7f6b7b7SZebra North * 97c7f6b7b7SZebra North * @throws Exception Thrown if the IP is not valid. 98c7f6b7b7SZebra North */ 99c7f6b7b7SZebra North public static function ipToNumber(string $ip): array 100c7f6b7b7SZebra North { 101c7f6b7b7SZebra North $binary = inet_pton($ip); 102c7f6b7b7SZebra North 103c7f6b7b7SZebra North if ($binary === false) { 104c7f6b7b7SZebra North throw new Exception('Invalid IP: ' . $ip); 105c7f6b7b7SZebra North } 106c7f6b7b7SZebra North 107c7f6b7b7SZebra North if (strlen($binary) === 4) { 108c7f6b7b7SZebra North // IPv4. 109*2f70db90SWillForan $ipNum = unpack('Nip', $binary)['ip']; 110*2f70db90SWillForan if (PHP_INT_SIZE == 4) { 111*2f70db90SWillForan // integer overlfow on 32bit: negative even though 'N'=unsigned 112*2f70db90SWillForan $ipNum = ($ipNum < 0)? bcadd($ipNum, Ip32::$b32) : (string)$ipNum; 113*2f70db90SWillForan } 114c7f6b7b7SZebra North return [ 115c7f6b7b7SZebra North 'version' => 4, 116c7f6b7b7SZebra North 'upper' => 0, 117*2f70db90SWillForan 'lower' => $ipNum, 118c7f6b7b7SZebra North ]; 119c7f6b7b7SZebra North } else { 120da569c7fSWillForan // IPv6. strlen==16 121*2f70db90SWillForan if(PHP_INT_SIZE == 4) { // 32-bit 122a060f5a0SWillForan $result = Ip32::ipv6UpperLowerOn32($binary); 123*2f70db90SWillForan } else { // 64-bit arch 124*2f70db90SWillForan $result = unpack('Jupper/Jlower', $binary); 125c9e618caSWillForan } 126c7f6b7b7SZebra North $result['version'] = 6; 127c7f6b7b7SZebra North return $result; 128c7f6b7b7SZebra North } 129c7f6b7b7SZebra North } 130c7f6b7b7SZebra North 131c7f6b7b7SZebra North /** 132c7f6b7b7SZebra North * Determine if an IP address is equal to another IP or within an IP range. 133c7f6b7b7SZebra North * IPv4 and IPv6 are supported. 134c7f6b7b7SZebra North * 135c7f6b7b7SZebra North * @param string $ip The address to test. 136c7f6b7b7SZebra North * @param string $ipOrRange An IP address or CIDR range. 137c7f6b7b7SZebra North * 138c7f6b7b7SZebra North * @return bool Returns true if the IP matches, false if not. 139c7f6b7b7SZebra North */ 140c7f6b7b7SZebra North public static function ipMatches(string $ip, string $ipOrRange): bool 141c7f6b7b7SZebra North { 142c7f6b7b7SZebra North try { 143c7f6b7b7SZebra North // If it's not a range, compare the addresses directly. 144c7f6b7b7SZebra North // Addresses are converted to numbers because the same address may be 145c7f6b7b7SZebra North // represented by different strings, e.g. "::1" and "::0001". 146c7f6b7b7SZebra North if (strpos($ipOrRange, '/') === false) { 147c7f6b7b7SZebra North return Ip::ipToNumber($ip) === Ip::ipToNumber($ipOrRange); 148c7f6b7b7SZebra North } 149c7f6b7b7SZebra North 150c7f6b7b7SZebra North return Ip::ipInRange($ip, $ipOrRange); 151c7f6b7b7SZebra North } catch (Exception $ex) { 152c7f6b7b7SZebra North // The IP address was invalid. 153c7f6b7b7SZebra North return false; 154c7f6b7b7SZebra North } 155c7f6b7b7SZebra North } 156c7f6b7b7SZebra North 157c7f6b7b7SZebra North /** 158c7f6b7b7SZebra North * Given the IP address of a proxy server, determine whether it is 159c7f6b7b7SZebra North * a known and trusted server. 160c7f6b7b7SZebra North * 16119d5ba27SAndreas Gohr * This test is performed using the config value `trustedproxies`. 162c7f6b7b7SZebra North * 163c7f6b7b7SZebra North * @param string $ip The IP address of the proxy. 164c7f6b7b7SZebra North * 165c7f6b7b7SZebra North * @return bool Returns true if the IP is trusted as a proxy. 166c7f6b7b7SZebra North */ 167c7f6b7b7SZebra North public static function proxyIsTrusted(string $ip): bool 168c7f6b7b7SZebra North { 169c7f6b7b7SZebra North global $conf; 170c7f6b7b7SZebra North 171c7f6b7b7SZebra North // If the configuration is empty then no proxies are trusted. 17219d5ba27SAndreas Gohr if (empty($conf['trustedproxies'])) { 173c7f6b7b7SZebra North return false; 174c7f6b7b7SZebra North } 175c7f6b7b7SZebra North 17619d5ba27SAndreas Gohr foreach ((array)$conf['trustedproxies'] as $trusted) { 177c7f6b7b7SZebra North if (Ip::ipMatches($ip, $trusted)) { 178ced0b55fSAndreas Gohr return true; // The given IP matches one of the trusted proxies. 179c7f6b7b7SZebra North } 180c7f6b7b7SZebra North } 181c7f6b7b7SZebra North 182ced0b55fSAndreas Gohr return false; // none of the proxies matched 183c7f6b7b7SZebra North } 184c7f6b7b7SZebra North 185c7f6b7b7SZebra North /** 186c7f6b7b7SZebra North * Get the originating IP address and the address of every proxy that the 187c7f6b7b7SZebra North * request has passed through, according to the X-Forwarded-For header. 188c7f6b7b7SZebra North * 189c7f6b7b7SZebra North * To prevent spoofing of the client IP, every proxy listed in the 190c7f6b7b7SZebra North * X-Forwarded-For header must be trusted, as well as the TCP/IP endpoint 191c7f6b7b7SZebra North * from which the connection was received (i.e. the final proxy). 192c7f6b7b7SZebra North * 193c7f6b7b7SZebra North * If the header is not present or contains an untrusted proxy then 194c7f6b7b7SZebra North * an empty array is returned. 195c7f6b7b7SZebra North * 196c7f6b7b7SZebra North * The client IP is the first entry in the returned list, followed by the 197c7f6b7b7SZebra North * proxies. 198c7f6b7b7SZebra North * 199c7f6b7b7SZebra North * @return string[] Returns an array of IP addresses. 200c7f6b7b7SZebra North */ 201c7f6b7b7SZebra North public static function forwardedFor(): array 202c7f6b7b7SZebra North { 203c7f6b7b7SZebra North /* @var Input $INPUT */ 204c7f6b7b7SZebra North global $INPUT, $conf; 205c7f6b7b7SZebra North 206c7f6b7b7SZebra North $forwardedFor = $INPUT->server->str('HTTP_X_FORWARDED_FOR'); 207c7f6b7b7SZebra North 208ced0b55fSAndreas Gohr if (empty($conf['trustedproxies']) || !$forwardedFor) { 209c7f6b7b7SZebra North return []; 210c7f6b7b7SZebra North } 211c7f6b7b7SZebra North 212c7f6b7b7SZebra North // This is the address from which the header was received. 213c7f6b7b7SZebra North $remoteAddr = $INPUT->server->str('REMOTE_ADDR'); 214c7f6b7b7SZebra North 215c7f6b7b7SZebra North // Get the client address from the X-Forwarded-For header. 216c7f6b7b7SZebra North // X-Forwarded-For: <client> [, <proxy>]... 217c7f6b7b7SZebra North $forwardedFor = explode(',', str_replace(' ', '', $forwardedFor)); 218c7f6b7b7SZebra North 219c7f6b7b7SZebra North // The client address is the first item, remove it from the list. 220c7f6b7b7SZebra North $clientAddress = array_shift($forwardedFor); 221c7f6b7b7SZebra North 222c7f6b7b7SZebra North // The remaining items are the proxies through which the X-Forwarded-For 223c7f6b7b7SZebra North // header has passed. The final proxy is the connection's remote address. 224c7f6b7b7SZebra North $proxies = $forwardedFor; 225c7f6b7b7SZebra North $proxies[] = $remoteAddr; 226c7f6b7b7SZebra North 227c7f6b7b7SZebra North // Ensure that every proxy is trusted. 228c7f6b7b7SZebra North foreach ($proxies as $proxy) { 229c7f6b7b7SZebra North if (!Ip::proxyIsTrusted($proxy)) { 230c7f6b7b7SZebra North return []; 231c7f6b7b7SZebra North } 232c7f6b7b7SZebra North } 233c7f6b7b7SZebra North 234c7f6b7b7SZebra North // Add the client address before the list of proxies. 235c7f6b7b7SZebra North return array_merge([$clientAddress], $proxies); 236c7f6b7b7SZebra North } 237c7f6b7b7SZebra North 238c7f6b7b7SZebra North /** 239c7f6b7b7SZebra North * Return the IP of the client. 240c7f6b7b7SZebra North * 241c7f6b7b7SZebra North * The IP is sourced from, in order of preference: 242c7f6b7b7SZebra North * 243c7f6b7b7SZebra North * - The X-Real-IP header if $conf[realip] is true. 244c7f6b7b7SZebra North * - The X-Forwarded-For header if all the proxies are trusted by $conf[trustedproxy]. 245c7f6b7b7SZebra North * - The TCP/IP connection remote address. 246c7f6b7b7SZebra North * - 0.0.0.0 if all else fails. 247c7f6b7b7SZebra North * 248c7f6b7b7SZebra North * The 'realip' config value should only be set to true if the X-Real-IP header 249c7f6b7b7SZebra North * is being added by the web server, otherwise it may be spoofed by the client. 250c7f6b7b7SZebra North * 251c7f6b7b7SZebra North * The 'trustedproxy' setting must not allow any IP, otherwise the X-Forwarded-For 252c7f6b7b7SZebra North * may be spoofed by the client. 253c7f6b7b7SZebra North * 254c7f6b7b7SZebra North * @return string Returns an IPv4 or IPv6 address. 255c7f6b7b7SZebra North */ 256c7f6b7b7SZebra North public static function clientIp(): string 257c7f6b7b7SZebra North { 258c7f6b7b7SZebra North return Ip::clientIps()[0]; 259c7f6b7b7SZebra North } 260c7f6b7b7SZebra North 261c7f6b7b7SZebra North /** 262c7f6b7b7SZebra North * Return the IP of the client and the proxies through which the connection has passed. 263c7f6b7b7SZebra North * 264c7f6b7b7SZebra North * The IPs are sourced from, in order of preference: 265c7f6b7b7SZebra North * 266c7f6b7b7SZebra North * - The X-Real-IP header if $conf[realip] is true. 26719d5ba27SAndreas Gohr * - The X-Forwarded-For header if all the proxies are trusted by $conf[trustedproxies]. 268c7f6b7b7SZebra North * - The TCP/IP connection remote address. 269c7f6b7b7SZebra North * - 0.0.0.0 if all else fails. 270c7f6b7b7SZebra North * 271c7f6b7b7SZebra North * @return string[] Returns an array of IPv4 or IPv6 addresses. 272c7f6b7b7SZebra North */ 273c7f6b7b7SZebra North public static function clientIps(): array 274c7f6b7b7SZebra North { 275c7f6b7b7SZebra North /* @var Input $INPUT */ 276c7f6b7b7SZebra North global $INPUT, $conf; 277c7f6b7b7SZebra North 278c7f6b7b7SZebra North // IPs in order of most to least preferred. 279c7f6b7b7SZebra North $ips = []; 280c7f6b7b7SZebra North 281c7f6b7b7SZebra North // Use the X-Real-IP header if it is enabled by the configuration. 282c7f6b7b7SZebra North if (!empty($conf['realip']) && $INPUT->server->str('HTTP_X_REAL_IP')) { 283c7f6b7b7SZebra North $ips[] = $INPUT->server->str('HTTP_X_REAL_IP'); 284c7f6b7b7SZebra North } 285c7f6b7b7SZebra North 286c7f6b7b7SZebra North // Add the X-Forwarded-For addresses if all proxies are trusted. 287c7f6b7b7SZebra North $ips = array_merge($ips, Ip::forwardedFor()); 288c7f6b7b7SZebra North 289c7f6b7b7SZebra North // Add the TCP/IP connection endpoint. 290c7f6b7b7SZebra North $ips[] = $INPUT->server->str('REMOTE_ADDR'); 291c7f6b7b7SZebra North 292c7f6b7b7SZebra North // Remove invalid IPs. 293e449acd0SAndreas Gohr $ips = array_filter($ips, static fn($ip) => filter_var($ip, FILTER_VALIDATE_IP)); 294c7f6b7b7SZebra North 295c7f6b7b7SZebra North // Remove duplicated IPs. 296c7f6b7b7SZebra North $ips = array_values(array_unique($ips)); 297c7f6b7b7SZebra North 298c7f6b7b7SZebra North // Add a fallback if for some reason there were no valid IPs. 299c7f6b7b7SZebra North if (!$ips) { 300c7f6b7b7SZebra North $ips[] = '0.0.0.0'; 301c7f6b7b7SZebra North } 302c7f6b7b7SZebra North 303c7f6b7b7SZebra North return $ips; 304c7f6b7b7SZebra North } 30533cb4e01SAndreas Gohr 30633cb4e01SAndreas Gohr /** 30733cb4e01SAndreas Gohr * Get the host name of the server. 30833cb4e01SAndreas Gohr * 30933cb4e01SAndreas Gohr * The host name is sourced from, in order of preference: 31033cb4e01SAndreas Gohr * 31133cb4e01SAndreas Gohr * - The X-Forwarded-Host header if it exists and the proxies are trusted. 31233cb4e01SAndreas Gohr * - The HTTP_HOST header. 31333cb4e01SAndreas Gohr * - The SERVER_NAME header. 31433cb4e01SAndreas Gohr * - The system's host name. 31533cb4e01SAndreas Gohr * 31633cb4e01SAndreas Gohr * @return string Returns the host name of the server. 31733cb4e01SAndreas Gohr */ 31833cb4e01SAndreas Gohr public static function hostName(): string 31933cb4e01SAndreas Gohr { 32033cb4e01SAndreas Gohr /* @var Input $INPUT */ 32133cb4e01SAndreas Gohr global $INPUT; 32233cb4e01SAndreas Gohr 3237caad012SAndreas Gohr $remoteAddr = $INPUT->server->str('REMOTE_ADDR'); 3247caad012SAndreas Gohr if ($INPUT->server->str('HTTP_X_FORWARDED_HOST') && self::proxyIsTrusted($remoteAddr)) { 32533cb4e01SAndreas Gohr return $INPUT->server->str('HTTP_X_FORWARDED_HOST'); 32633cb4e01SAndreas Gohr } elseif ($INPUT->server->str('HTTP_HOST')) { 32733cb4e01SAndreas Gohr return $INPUT->server->str('HTTP_HOST'); 32833cb4e01SAndreas Gohr } elseif ($INPUT->server->str('SERVER_NAME')) { 32933cb4e01SAndreas Gohr return $INPUT->server->str('SERVER_NAME'); 33033cb4e01SAndreas Gohr } else { 33133cb4e01SAndreas Gohr return php_uname('n'); 33233cb4e01SAndreas Gohr } 33333cb4e01SAndreas Gohr } 33433cb4e01SAndreas Gohr 33533cb4e01SAndreas Gohr /** 33633cb4e01SAndreas Gohr * Is the connection using the HTTPS protocol? 33733cb4e01SAndreas Gohr * 33833cb4e01SAndreas Gohr * Will use the X-Forwarded-Proto header if it exists and the proxies are trusted, otherwise 33933cb4e01SAndreas Gohr * the HTTPS environment is used. 34033cb4e01SAndreas Gohr * 34133cb4e01SAndreas Gohr * @return bool 34233cb4e01SAndreas Gohr */ 34333cb4e01SAndreas Gohr public static function isSsl(): bool 34433cb4e01SAndreas Gohr { 34533cb4e01SAndreas Gohr /* @var Input $INPUT */ 34633cb4e01SAndreas Gohr global $INPUT; 34733cb4e01SAndreas Gohr 3487caad012SAndreas Gohr $remoteAddr = $INPUT->server->str('REMOTE_ADDR'); 3497caad012SAndreas Gohr if ($INPUT->server->has('HTTP_X_FORWARDED_PROTO') && self::proxyIsTrusted($remoteAddr)) { 35033cb4e01SAndreas Gohr return $INPUT->server->str('HTTP_X_FORWARDED_PROTO') === 'https'; 35133cb4e01SAndreas Gohr } 3527caad012SAndreas Gohr return !preg_match('/^(|off|false|disabled)$/i', $INPUT->server->str('HTTPS', 'off')); 35333cb4e01SAndreas Gohr } 354c7f6b7b7SZebra North} 355