1c7f6b7b7SZebra North<?php 2c7f6b7b7SZebra North 3c7f6b7b7SZebra North/** 433cb4e01SAndreas Gohr * DokuWiki IP address and reverse proxy functions. 5c7f6b7b7SZebra North * 6c7f6b7b7SZebra North * @license GPL 2 (http://www.gnu.org/licenses/gpl.html) 7c7f6b7b7SZebra North * @author Zebra North <mrzebra@mrzebra.co.uk> 8c7f6b7b7SZebra North */ 9c7f6b7b7SZebra North 10c7f6b7b7SZebra Northnamespace dokuwiki; 11c7f6b7b7SZebra North 12e449acd0SAndreas Gohruse dokuwiki\Input\Input; 13*91da8d44SWillForanuse dokuwiki\Ip32; 14c7f6b7b7SZebra Northuse Exception; 15c7f6b7b7SZebra North 16c7f6b7b7SZebra Northclass Ip 17c7f6b7b7SZebra North{ 18c7f6b7b7SZebra North /** 19c7f6b7b7SZebra North * Determine whether an IP address is within a given CIDR range. 20c7f6b7b7SZebra North * The needle and haystack may be either IPv4 or IPv6. 21c7f6b7b7SZebra North * 22c7f6b7b7SZebra North * Example: 23c7f6b7b7SZebra North * 24c7f6b7b7SZebra North * ipInRange('192.168.11.123', '192.168.0.0/16') === true 25c7f6b7b7SZebra North * ipInRange('192.168.11.123', '::192.168.0.0/80') === true 26c7f6b7b7SZebra North * ipInRange('::192.168.11.123', '192.168.0.0/16') === true 27c7f6b7b7SZebra North * ipInRange('::192.168.11.123', '::192.168.0.0/80') === true 28c7f6b7b7SZebra North * 29e449acd0SAndreas Gohr * @param string $needle The IP to test, either IPv4 in dotted decimal 30c7f6b7b7SZebra North * notation or IPv6 in colon notation. 31c7f6b7b7SZebra North * @param string $haystack The CIDR range as an IP followed by a forward 32c7f6b7b7SZebra North * slash and the number of significant bits. 33c7f6b7b7SZebra North * 34c7f6b7b7SZebra North * @return bool Returns true if $needle is within the range specified 35c7f6b7b7SZebra North * by $haystack, false if it is outside the range. 36c7f6b7b7SZebra North * 37c7f6b7b7SZebra North * @throws Exception Thrown if $needle is not a valid IP address. 38c7f6b7b7SZebra North * @throws Exception Thrown if $haystack is not a valid IP range. 39c7f6b7b7SZebra North */ 40c7f6b7b7SZebra North public static function ipInRange(string $needle, string $haystack): bool 41c7f6b7b7SZebra North { 42c7f6b7b7SZebra North $range = explode('/', $haystack); 43c7f6b7b7SZebra North $networkIp = Ip::ipToNumber($range[0]); 44c7f6b7b7SZebra North $maskLength = $range[1]; 45c7f6b7b7SZebra North 46c7f6b7b7SZebra North // For an IPv4 address the top 96 bits must be zero. 47c7f6b7b7SZebra North if ($networkIp['version'] === 4) { 48c7f6b7b7SZebra North $maskLength += 96; 49c7f6b7b7SZebra North } 50c7f6b7b7SZebra North 51c7f6b7b7SZebra North if ($maskLength > 128) { 52c7f6b7b7SZebra North throw new Exception('Invalid IP range mask: ' . $haystack); 53c7f6b7b7SZebra North } 54c7f6b7b7SZebra North 55c7f6b7b7SZebra North 56c7f6b7b7SZebra North $needle = Ip::ipToNumber($needle); 57c7f6b7b7SZebra North 5825a70af9SWillForan $maskLengthUpper = min($maskLength, 64); 5925a70af9SWillForan $maskLengthLower = max(0, $maskLength - 64); 6025a70af9SWillForan 6125a70af9SWillForan if (PHP_INT_SIZE == 4) { 62*91da8d44SWillForan $needle_up = Ip32::bitmask64_32($needle['upper'], $maskLengthUpper); 63*91da8d44SWillForan $net_up = Ip32::bitmask64_32($networkIp['upper'], $maskLengthUpper); 64*91da8d44SWillForan $needle_lo = Ip32::bitmask64_32($needle['lower'], $maskLengthLower); 65*91da8d44SWillForan $net_lo = Ip32::bitmask64_32($networkIp['lower'], $maskLengthLower); 6625a70af9SWillForan } else { 6725a70af9SWillForan $maskUpper = ~0 << intval(64 - $maskLengthUpper); 6825a70af9SWillForan $maskLower = ~0 << intval(64 - $maskLengthLower); 6925a70af9SWillForan 7025a70af9SWillForan $needle_up = $needle['upper'] & $maskUpper; 7125a70af9SWillForan $net_up = $networkIp['upper'] & $maskUpper; 7225a70af9SWillForan $needle_lo = $needle['lower'] & $maskLower; 7325a70af9SWillForan $net_lo = $networkIp['lower'] & $maskLower; 7425a70af9SWillForan } 7525a70af9SWillForan 7625a70af9SWillForan return $needle_up === $net_up && $needle_lo === $net_lo; 7725a70af9SWillForan } 7825a70af9SWillForan 7925a70af9SWillForan /** 80c7f6b7b7SZebra North * Convert an IP address from a string to a number. 81c7f6b7b7SZebra North * 82c7f6b7b7SZebra North * This splits 128 bit IP addresses into the upper and lower 64 bits, and 83c7f6b7b7SZebra North * also returns whether the IP given was IPv4 or IPv6. 84c7f6b7b7SZebra North * 85c7f6b7b7SZebra North * The returned array contains: 86c7f6b7b7SZebra North * 87c7f6b7b7SZebra North * - version: Either '4' or '6'. 88c7f6b7b7SZebra North * - upper: The upper 64 bits of the IP. 89c7f6b7b7SZebra North * - lower: The lower 64 bits of the IP. 90c7f6b7b7SZebra North * 91c7f6b7b7SZebra North * For an IPv4 address, 'upper' will always be zero. 92c7f6b7b7SZebra North * 93e449acd0SAndreas Gohr * @param string $ip The IPv4 or IPv6 address. 94c7f6b7b7SZebra North * 95c7f6b7b7SZebra North * @return int[] Returns an array of 'version', 'upper', 'lower'. 96c7f6b7b7SZebra North * 97c7f6b7b7SZebra North * @throws Exception Thrown if the IP is not valid. 98c7f6b7b7SZebra North */ 99c7f6b7b7SZebra North public static function ipToNumber(string $ip): array 100c7f6b7b7SZebra North { 101c7f6b7b7SZebra North $binary = inet_pton($ip); 102c7f6b7b7SZebra North 103c7f6b7b7SZebra North if ($binary === false) { 104c7f6b7b7SZebra North throw new Exception('Invalid IP: ' . $ip); 105c7f6b7b7SZebra North } 106c7f6b7b7SZebra North 107c7f6b7b7SZebra North if (strlen($binary) === 4) { 108c7f6b7b7SZebra North // IPv4. 109c7f6b7b7SZebra North return [ 110c7f6b7b7SZebra North 'version' => 4, 111c7f6b7b7SZebra North 'upper' => 0, 112c7f6b7b7SZebra North 'lower' => unpack('Nip', $binary)['ip'], 113c7f6b7b7SZebra North ]; 114c7f6b7b7SZebra North } else { 115da569c7fSWillForan // IPv6. strlen==16 116c9e618caSWillForan if(PHP_INT_SIZE == 8) { // 64-bit arch 117c7f6b7b7SZebra North $result = unpack('Jupper/Jlower', $binary); 118c9e618caSWillForan } else { // 32-bit 119*91da8d44SWillForan $result = Ip32::ipv6_upper_lower_32($binary); 120c9e618caSWillForan } 121c7f6b7b7SZebra North $result['version'] = 6; 122c7f6b7b7SZebra North return $result; 123c7f6b7b7SZebra North } 124c7f6b7b7SZebra North } 125c7f6b7b7SZebra North 126c7f6b7b7SZebra North /** 127c7f6b7b7SZebra North * Determine if an IP address is equal to another IP or within an IP range. 128c7f6b7b7SZebra North * IPv4 and IPv6 are supported. 129c7f6b7b7SZebra North * 130c7f6b7b7SZebra North * @param string $ip The address to test. 131c7f6b7b7SZebra North * @param string $ipOrRange An IP address or CIDR range. 132c7f6b7b7SZebra North * 133c7f6b7b7SZebra North * @return bool Returns true if the IP matches, false if not. 134c7f6b7b7SZebra North */ 135c7f6b7b7SZebra North public static function ipMatches(string $ip, string $ipOrRange): bool 136c7f6b7b7SZebra North { 137c7f6b7b7SZebra North try { 138c7f6b7b7SZebra North // If it's not a range, compare the addresses directly. 139c7f6b7b7SZebra North // Addresses are converted to numbers because the same address may be 140c7f6b7b7SZebra North // represented by different strings, e.g. "::1" and "::0001". 141c7f6b7b7SZebra North if (strpos($ipOrRange, '/') === false) { 142c7f6b7b7SZebra North return Ip::ipToNumber($ip) === Ip::ipToNumber($ipOrRange); 143c7f6b7b7SZebra North } 144c7f6b7b7SZebra North 145c7f6b7b7SZebra North return Ip::ipInRange($ip, $ipOrRange); 146c7f6b7b7SZebra North } catch (Exception $ex) { 147c7f6b7b7SZebra North // The IP address was invalid. 148c7f6b7b7SZebra North return false; 149c7f6b7b7SZebra North } 150c7f6b7b7SZebra North } 151c7f6b7b7SZebra North 152c7f6b7b7SZebra North /** 153c7f6b7b7SZebra North * Given the IP address of a proxy server, determine whether it is 154c7f6b7b7SZebra North * a known and trusted server. 155c7f6b7b7SZebra North * 15619d5ba27SAndreas Gohr * This test is performed using the config value `trustedproxies`. 157c7f6b7b7SZebra North * 158c7f6b7b7SZebra North * @param string $ip The IP address of the proxy. 159c7f6b7b7SZebra North * 160c7f6b7b7SZebra North * @return bool Returns true if the IP is trusted as a proxy. 161c7f6b7b7SZebra North */ 162c7f6b7b7SZebra North public static function proxyIsTrusted(string $ip): bool 163c7f6b7b7SZebra North { 164c7f6b7b7SZebra North global $conf; 165c7f6b7b7SZebra North 166c7f6b7b7SZebra North // If the configuration is empty then no proxies are trusted. 16719d5ba27SAndreas Gohr if (empty($conf['trustedproxies'])) { 168c7f6b7b7SZebra North return false; 169c7f6b7b7SZebra North } 170c7f6b7b7SZebra North 17119d5ba27SAndreas Gohr foreach ((array)$conf['trustedproxies'] as $trusted) { 172c7f6b7b7SZebra North if (Ip::ipMatches($ip, $trusted)) { 173ced0b55fSAndreas Gohr return true; // The given IP matches one of the trusted proxies. 174c7f6b7b7SZebra North } 175c7f6b7b7SZebra North } 176c7f6b7b7SZebra North 177ced0b55fSAndreas Gohr return false; // none of the proxies matched 178c7f6b7b7SZebra North } 179c7f6b7b7SZebra North 180c7f6b7b7SZebra North /** 181c7f6b7b7SZebra North * Get the originating IP address and the address of every proxy that the 182c7f6b7b7SZebra North * request has passed through, according to the X-Forwarded-For header. 183c7f6b7b7SZebra North * 184c7f6b7b7SZebra North * To prevent spoofing of the client IP, every proxy listed in the 185c7f6b7b7SZebra North * X-Forwarded-For header must be trusted, as well as the TCP/IP endpoint 186c7f6b7b7SZebra North * from which the connection was received (i.e. the final proxy). 187c7f6b7b7SZebra North * 188c7f6b7b7SZebra North * If the header is not present or contains an untrusted proxy then 189c7f6b7b7SZebra North * an empty array is returned. 190c7f6b7b7SZebra North * 191c7f6b7b7SZebra North * The client IP is the first entry in the returned list, followed by the 192c7f6b7b7SZebra North * proxies. 193c7f6b7b7SZebra North * 194c7f6b7b7SZebra North * @return string[] Returns an array of IP addresses. 195c7f6b7b7SZebra North */ 196c7f6b7b7SZebra North public static function forwardedFor(): array 197c7f6b7b7SZebra North { 198c7f6b7b7SZebra North /* @var Input $INPUT */ 199c7f6b7b7SZebra North global $INPUT, $conf; 200c7f6b7b7SZebra North 201c7f6b7b7SZebra North $forwardedFor = $INPUT->server->str('HTTP_X_FORWARDED_FOR'); 202c7f6b7b7SZebra North 203ced0b55fSAndreas Gohr if (empty($conf['trustedproxies']) || !$forwardedFor) { 204c7f6b7b7SZebra North return []; 205c7f6b7b7SZebra North } 206c7f6b7b7SZebra North 207c7f6b7b7SZebra North // This is the address from which the header was received. 208c7f6b7b7SZebra North $remoteAddr = $INPUT->server->str('REMOTE_ADDR'); 209c7f6b7b7SZebra North 210c7f6b7b7SZebra North // Get the client address from the X-Forwarded-For header. 211c7f6b7b7SZebra North // X-Forwarded-For: <client> [, <proxy>]... 212c7f6b7b7SZebra North $forwardedFor = explode(',', str_replace(' ', '', $forwardedFor)); 213c7f6b7b7SZebra North 214c7f6b7b7SZebra North // The client address is the first item, remove it from the list. 215c7f6b7b7SZebra North $clientAddress = array_shift($forwardedFor); 216c7f6b7b7SZebra North 217c7f6b7b7SZebra North // The remaining items are the proxies through which the X-Forwarded-For 218c7f6b7b7SZebra North // header has passed. The final proxy is the connection's remote address. 219c7f6b7b7SZebra North $proxies = $forwardedFor; 220c7f6b7b7SZebra North $proxies[] = $remoteAddr; 221c7f6b7b7SZebra North 222c7f6b7b7SZebra North // Ensure that every proxy is trusted. 223c7f6b7b7SZebra North foreach ($proxies as $proxy) { 224c7f6b7b7SZebra North if (!Ip::proxyIsTrusted($proxy)) { 225c7f6b7b7SZebra North return []; 226c7f6b7b7SZebra North } 227c7f6b7b7SZebra North } 228c7f6b7b7SZebra North 229c7f6b7b7SZebra North // Add the client address before the list of proxies. 230c7f6b7b7SZebra North return array_merge([$clientAddress], $proxies); 231c7f6b7b7SZebra North } 232c7f6b7b7SZebra North 233c7f6b7b7SZebra North /** 234c7f6b7b7SZebra North * Return the IP of the client. 235c7f6b7b7SZebra North * 236c7f6b7b7SZebra North * The IP is sourced from, in order of preference: 237c7f6b7b7SZebra North * 238c7f6b7b7SZebra North * - The X-Real-IP header if $conf[realip] is true. 239c7f6b7b7SZebra North * - The X-Forwarded-For header if all the proxies are trusted by $conf[trustedproxy]. 240c7f6b7b7SZebra North * - The TCP/IP connection remote address. 241c7f6b7b7SZebra North * - 0.0.0.0 if all else fails. 242c7f6b7b7SZebra North * 243c7f6b7b7SZebra North * The 'realip' config value should only be set to true if the X-Real-IP header 244c7f6b7b7SZebra North * is being added by the web server, otherwise it may be spoofed by the client. 245c7f6b7b7SZebra North * 246c7f6b7b7SZebra North * The 'trustedproxy' setting must not allow any IP, otherwise the X-Forwarded-For 247c7f6b7b7SZebra North * may be spoofed by the client. 248c7f6b7b7SZebra North * 249c7f6b7b7SZebra North * @return string Returns an IPv4 or IPv6 address. 250c7f6b7b7SZebra North */ 251c7f6b7b7SZebra North public static function clientIp(): string 252c7f6b7b7SZebra North { 253c7f6b7b7SZebra North return Ip::clientIps()[0]; 254c7f6b7b7SZebra North } 255c7f6b7b7SZebra North 256c7f6b7b7SZebra North /** 257c7f6b7b7SZebra North * Return the IP of the client and the proxies through which the connection has passed. 258c7f6b7b7SZebra North * 259c7f6b7b7SZebra North * The IPs are sourced from, in order of preference: 260c7f6b7b7SZebra North * 261c7f6b7b7SZebra North * - The X-Real-IP header if $conf[realip] is true. 26219d5ba27SAndreas Gohr * - The X-Forwarded-For header if all the proxies are trusted by $conf[trustedproxies]. 263c7f6b7b7SZebra North * - The TCP/IP connection remote address. 264c7f6b7b7SZebra North * - 0.0.0.0 if all else fails. 265c7f6b7b7SZebra North * 266c7f6b7b7SZebra North * @return string[] Returns an array of IPv4 or IPv6 addresses. 267c7f6b7b7SZebra North */ 268c7f6b7b7SZebra North public static function clientIps(): array 269c7f6b7b7SZebra North { 270c7f6b7b7SZebra North /* @var Input $INPUT */ 271c7f6b7b7SZebra North global $INPUT, $conf; 272c7f6b7b7SZebra North 273c7f6b7b7SZebra North // IPs in order of most to least preferred. 274c7f6b7b7SZebra North $ips = []; 275c7f6b7b7SZebra North 276c7f6b7b7SZebra North // Use the X-Real-IP header if it is enabled by the configuration. 277c7f6b7b7SZebra North if (!empty($conf['realip']) && $INPUT->server->str('HTTP_X_REAL_IP')) { 278c7f6b7b7SZebra North $ips[] = $INPUT->server->str('HTTP_X_REAL_IP'); 279c7f6b7b7SZebra North } 280c7f6b7b7SZebra North 281c7f6b7b7SZebra North // Add the X-Forwarded-For addresses if all proxies are trusted. 282c7f6b7b7SZebra North $ips = array_merge($ips, Ip::forwardedFor()); 283c7f6b7b7SZebra North 284c7f6b7b7SZebra North // Add the TCP/IP connection endpoint. 285c7f6b7b7SZebra North $ips[] = $INPUT->server->str('REMOTE_ADDR'); 286c7f6b7b7SZebra North 287c7f6b7b7SZebra North // Remove invalid IPs. 288e449acd0SAndreas Gohr $ips = array_filter($ips, static fn($ip) => filter_var($ip, FILTER_VALIDATE_IP)); 289c7f6b7b7SZebra North 290c7f6b7b7SZebra North // Remove duplicated IPs. 291c7f6b7b7SZebra North $ips = array_values(array_unique($ips)); 292c7f6b7b7SZebra North 293c7f6b7b7SZebra North // Add a fallback if for some reason there were no valid IPs. 294c7f6b7b7SZebra North if (!$ips) { 295c7f6b7b7SZebra North $ips[] = '0.0.0.0'; 296c7f6b7b7SZebra North } 297c7f6b7b7SZebra North 298c7f6b7b7SZebra North return $ips; 299c7f6b7b7SZebra North } 30033cb4e01SAndreas Gohr 30133cb4e01SAndreas Gohr /** 30233cb4e01SAndreas Gohr * Get the host name of the server. 30333cb4e01SAndreas Gohr * 30433cb4e01SAndreas Gohr * The host name is sourced from, in order of preference: 30533cb4e01SAndreas Gohr * 30633cb4e01SAndreas Gohr * - The X-Forwarded-Host header if it exists and the proxies are trusted. 30733cb4e01SAndreas Gohr * - The HTTP_HOST header. 30833cb4e01SAndreas Gohr * - The SERVER_NAME header. 30933cb4e01SAndreas Gohr * - The system's host name. 31033cb4e01SAndreas Gohr * 31133cb4e01SAndreas Gohr * @return string Returns the host name of the server. 31233cb4e01SAndreas Gohr */ 31333cb4e01SAndreas Gohr public static function hostName(): string 31433cb4e01SAndreas Gohr { 31533cb4e01SAndreas Gohr /* @var Input $INPUT */ 31633cb4e01SAndreas Gohr global $INPUT; 31733cb4e01SAndreas Gohr 3187caad012SAndreas Gohr $remoteAddr = $INPUT->server->str('REMOTE_ADDR'); 3197caad012SAndreas Gohr if ($INPUT->server->str('HTTP_X_FORWARDED_HOST') && self::proxyIsTrusted($remoteAddr)) { 32033cb4e01SAndreas Gohr return $INPUT->server->str('HTTP_X_FORWARDED_HOST'); 32133cb4e01SAndreas Gohr } elseif ($INPUT->server->str('HTTP_HOST')) { 32233cb4e01SAndreas Gohr return $INPUT->server->str('HTTP_HOST'); 32333cb4e01SAndreas Gohr } elseif ($INPUT->server->str('SERVER_NAME')) { 32433cb4e01SAndreas Gohr return $INPUT->server->str('SERVER_NAME'); 32533cb4e01SAndreas Gohr } else { 32633cb4e01SAndreas Gohr return php_uname('n'); 32733cb4e01SAndreas Gohr } 32833cb4e01SAndreas Gohr } 32933cb4e01SAndreas Gohr 33033cb4e01SAndreas Gohr /** 33133cb4e01SAndreas Gohr * Is the connection using the HTTPS protocol? 33233cb4e01SAndreas Gohr * 33333cb4e01SAndreas Gohr * Will use the X-Forwarded-Proto header if it exists and the proxies are trusted, otherwise 33433cb4e01SAndreas Gohr * the HTTPS environment is used. 33533cb4e01SAndreas Gohr * 33633cb4e01SAndreas Gohr * @return bool 33733cb4e01SAndreas Gohr */ 33833cb4e01SAndreas Gohr public static function isSsl(): bool 33933cb4e01SAndreas Gohr { 34033cb4e01SAndreas Gohr /* @var Input $INPUT */ 34133cb4e01SAndreas Gohr global $INPUT; 34233cb4e01SAndreas Gohr 3437caad012SAndreas Gohr $remoteAddr = $INPUT->server->str('REMOTE_ADDR'); 3447caad012SAndreas Gohr if ($INPUT->server->has('HTTP_X_FORWARDED_PROTO') && self::proxyIsTrusted($remoteAddr)) { 34533cb4e01SAndreas Gohr return $INPUT->server->str('HTTP_X_FORWARDED_PROTO') === 'https'; 34633cb4e01SAndreas Gohr } 3477caad012SAndreas Gohr return !preg_match('/^(|off|false|disabled)$/i', $INPUT->server->str('HTTPS', 'off')); 34833cb4e01SAndreas Gohr } 349c7f6b7b7SZebra North} 350