xref: /dokuwiki/inc/Ip.php (revision 91da8d440c37d90167dc8ee25e6de7f854a11f1e)
1c7f6b7b7SZebra North<?php
2c7f6b7b7SZebra North
3c7f6b7b7SZebra North/**
433cb4e01SAndreas Gohr * DokuWiki IP address and reverse proxy functions.
5c7f6b7b7SZebra North *
6c7f6b7b7SZebra North * @license    GPL 2 (http://www.gnu.org/licenses/gpl.html)
7c7f6b7b7SZebra North * @author     Zebra North <mrzebra@mrzebra.co.uk>
8c7f6b7b7SZebra North */
9c7f6b7b7SZebra North
10c7f6b7b7SZebra Northnamespace dokuwiki;
11c7f6b7b7SZebra North
12e449acd0SAndreas Gohruse dokuwiki\Input\Input;
13*91da8d44SWillForanuse dokuwiki\Ip32;
14c7f6b7b7SZebra Northuse Exception;
15c7f6b7b7SZebra North
16c7f6b7b7SZebra Northclass Ip
17c7f6b7b7SZebra North{
18c7f6b7b7SZebra North    /**
19c7f6b7b7SZebra North     * Determine whether an IP address is within a given CIDR range.
20c7f6b7b7SZebra North     * The needle and haystack may be either IPv4 or IPv6.
21c7f6b7b7SZebra North     *
22c7f6b7b7SZebra North     * Example:
23c7f6b7b7SZebra North     *
24c7f6b7b7SZebra North     * ipInRange('192.168.11.123', '192.168.0.0/16') === true
25c7f6b7b7SZebra North     * ipInRange('192.168.11.123', '::192.168.0.0/80') === true
26c7f6b7b7SZebra North     * ipInRange('::192.168.11.123', '192.168.0.0/16') === true
27c7f6b7b7SZebra North     * ipInRange('::192.168.11.123', '::192.168.0.0/80') === true
28c7f6b7b7SZebra North     *
29e449acd0SAndreas Gohr     * @param string $needle The IP to test, either IPv4 in dotted decimal
30c7f6b7b7SZebra North     *                         notation or IPv6 in colon notation.
31c7f6b7b7SZebra North     * @param string $haystack The CIDR range as an IP followed by a forward
32c7f6b7b7SZebra North     *                         slash and the number of significant bits.
33c7f6b7b7SZebra North     *
34c7f6b7b7SZebra North     * @return bool Returns true if $needle is within the range specified
35c7f6b7b7SZebra North     *              by $haystack, false if it is outside the range.
36c7f6b7b7SZebra North     *
37c7f6b7b7SZebra North     * @throws Exception Thrown if $needle is not a valid IP address.
38c7f6b7b7SZebra North     * @throws Exception Thrown if $haystack is not a valid IP range.
39c7f6b7b7SZebra North     */
40c7f6b7b7SZebra North    public static function ipInRange(string $needle, string $haystack): bool
41c7f6b7b7SZebra North    {
42c7f6b7b7SZebra North        $range = explode('/', $haystack);
43c7f6b7b7SZebra North        $networkIp = Ip::ipToNumber($range[0]);
44c7f6b7b7SZebra North        $maskLength = $range[1];
45c7f6b7b7SZebra North
46c7f6b7b7SZebra North        // For an IPv4 address the top 96 bits must be zero.
47c7f6b7b7SZebra North        if ($networkIp['version'] === 4) {
48c7f6b7b7SZebra North            $maskLength += 96;
49c7f6b7b7SZebra North        }
50c7f6b7b7SZebra North
51c7f6b7b7SZebra North        if ($maskLength > 128) {
52c7f6b7b7SZebra North            throw new Exception('Invalid IP range mask: ' . $haystack);
53c7f6b7b7SZebra North        }
54c7f6b7b7SZebra North
55c7f6b7b7SZebra North
56c7f6b7b7SZebra North        $needle = Ip::ipToNumber($needle);
57c7f6b7b7SZebra North
5825a70af9SWillForan        $maskLengthUpper = min($maskLength, 64);
5925a70af9SWillForan        $maskLengthLower = max(0, $maskLength - 64);
6025a70af9SWillForan
6125a70af9SWillForan        if (PHP_INT_SIZE == 4) {
62*91da8d44SWillForan            $needle_up = Ip32::bitmask64_32($needle['upper'],    $maskLengthUpper);
63*91da8d44SWillForan            $net_up    = Ip32::bitmask64_32($networkIp['upper'], $maskLengthUpper);
64*91da8d44SWillForan            $needle_lo = Ip32::bitmask64_32($needle['lower'],    $maskLengthLower);
65*91da8d44SWillForan            $net_lo    = Ip32::bitmask64_32($networkIp['lower'], $maskLengthLower);
6625a70af9SWillForan        } else {
6725a70af9SWillForan            $maskUpper = ~0 << intval(64 - $maskLengthUpper);
6825a70af9SWillForan            $maskLower = ~0 << intval(64 - $maskLengthLower);
6925a70af9SWillForan
7025a70af9SWillForan            $needle_up = $needle['upper'] & $maskUpper;
7125a70af9SWillForan            $net_up    = $networkIp['upper'] & $maskUpper;
7225a70af9SWillForan            $needle_lo = $needle['lower'] & $maskLower;
7325a70af9SWillForan            $net_lo    = $networkIp['lower'] & $maskLower;
7425a70af9SWillForan        }
7525a70af9SWillForan
7625a70af9SWillForan        return $needle_up === $net_up && $needle_lo === $net_lo;
7725a70af9SWillForan    }
7825a70af9SWillForan
7925a70af9SWillForan    /**
80c7f6b7b7SZebra North     * Convert an IP address from a string to a number.
81c7f6b7b7SZebra North     *
82c7f6b7b7SZebra North     * This splits 128 bit IP addresses into the upper and lower 64 bits, and
83c7f6b7b7SZebra North     * also returns whether the IP given was IPv4 or IPv6.
84c7f6b7b7SZebra North     *
85c7f6b7b7SZebra North     * The returned array contains:
86c7f6b7b7SZebra North     *
87c7f6b7b7SZebra North     *  - version: Either '4' or '6'.
88c7f6b7b7SZebra North     *  - upper: The upper 64 bits of the IP.
89c7f6b7b7SZebra North     *  - lower: The lower 64 bits of the IP.
90c7f6b7b7SZebra North     *
91c7f6b7b7SZebra North     * For an IPv4 address, 'upper' will always be zero.
92c7f6b7b7SZebra North     *
93e449acd0SAndreas Gohr     * @param string $ip The IPv4 or IPv6 address.
94c7f6b7b7SZebra North     *
95c7f6b7b7SZebra North     * @return int[] Returns an array of 'version', 'upper', 'lower'.
96c7f6b7b7SZebra North     *
97c7f6b7b7SZebra North     * @throws Exception Thrown if the IP is not valid.
98c7f6b7b7SZebra North     */
99c7f6b7b7SZebra North    public static function ipToNumber(string $ip): array
100c7f6b7b7SZebra North    {
101c7f6b7b7SZebra North        $binary = inet_pton($ip);
102c7f6b7b7SZebra North
103c7f6b7b7SZebra North        if ($binary === false) {
104c7f6b7b7SZebra North            throw new Exception('Invalid IP: ' . $ip);
105c7f6b7b7SZebra North        }
106c7f6b7b7SZebra North
107c7f6b7b7SZebra North        if (strlen($binary) === 4) {
108c7f6b7b7SZebra North            // IPv4.
109c7f6b7b7SZebra North            return [
110c7f6b7b7SZebra North                'version' => 4,
111c7f6b7b7SZebra North                'upper' => 0,
112c7f6b7b7SZebra North                'lower' => unpack('Nip', $binary)['ip'],
113c7f6b7b7SZebra North            ];
114c7f6b7b7SZebra North        } else {
115da569c7fSWillForan            // IPv6. strlen==16
116c9e618caSWillForan            if(PHP_INT_SIZE == 8) { // 64-bit arch
117c7f6b7b7SZebra North               $result = unpack('Jupper/Jlower', $binary);
118c9e618caSWillForan            } else { // 32-bit
119*91da8d44SWillForan               $result = Ip32::ipv6_upper_lower_32($binary);
120c9e618caSWillForan            }
121c7f6b7b7SZebra North            $result['version'] = 6;
122c7f6b7b7SZebra North            return $result;
123c7f6b7b7SZebra North        }
124c7f6b7b7SZebra North    }
125c7f6b7b7SZebra North
126c7f6b7b7SZebra North    /**
127c7f6b7b7SZebra North     * Determine if an IP address is equal to another IP or within an IP range.
128c7f6b7b7SZebra North     * IPv4 and IPv6 are supported.
129c7f6b7b7SZebra North     *
130c7f6b7b7SZebra North     * @param string $ip The address to test.
131c7f6b7b7SZebra North     * @param string $ipOrRange An IP address or CIDR range.
132c7f6b7b7SZebra North     *
133c7f6b7b7SZebra North     * @return bool Returns true if the IP matches, false if not.
134c7f6b7b7SZebra North     */
135c7f6b7b7SZebra North    public static function ipMatches(string $ip, string $ipOrRange): bool
136c7f6b7b7SZebra North    {
137c7f6b7b7SZebra North        try {
138c7f6b7b7SZebra North            // If it's not a range, compare the addresses directly.
139c7f6b7b7SZebra North            // Addresses are converted to numbers because the same address may be
140c7f6b7b7SZebra North            // represented by different strings, e.g. "::1" and "::0001".
141c7f6b7b7SZebra North            if (strpos($ipOrRange, '/') === false) {
142c7f6b7b7SZebra North                return Ip::ipToNumber($ip) === Ip::ipToNumber($ipOrRange);
143c7f6b7b7SZebra North            }
144c7f6b7b7SZebra North
145c7f6b7b7SZebra North            return Ip::ipInRange($ip, $ipOrRange);
146c7f6b7b7SZebra North        } catch (Exception $ex) {
147c7f6b7b7SZebra North            // The IP address was invalid.
148c7f6b7b7SZebra North            return false;
149c7f6b7b7SZebra North        }
150c7f6b7b7SZebra North    }
151c7f6b7b7SZebra North
152c7f6b7b7SZebra North    /**
153c7f6b7b7SZebra North     * Given the IP address of a proxy server, determine whether it is
154c7f6b7b7SZebra North     * a known and trusted server.
155c7f6b7b7SZebra North     *
15619d5ba27SAndreas Gohr     * This test is performed using the config value `trustedproxies`.
157c7f6b7b7SZebra North     *
158c7f6b7b7SZebra North     * @param string $ip The IP address of the proxy.
159c7f6b7b7SZebra North     *
160c7f6b7b7SZebra North     * @return bool Returns true if the IP is trusted as a proxy.
161c7f6b7b7SZebra North     */
162c7f6b7b7SZebra North    public static function proxyIsTrusted(string $ip): bool
163c7f6b7b7SZebra North    {
164c7f6b7b7SZebra North        global $conf;
165c7f6b7b7SZebra North
166c7f6b7b7SZebra North        // If the configuration is empty then no proxies are trusted.
16719d5ba27SAndreas Gohr        if (empty($conf['trustedproxies'])) {
168c7f6b7b7SZebra North            return false;
169c7f6b7b7SZebra North        }
170c7f6b7b7SZebra North
17119d5ba27SAndreas Gohr        foreach ((array)$conf['trustedproxies'] as $trusted) {
172c7f6b7b7SZebra North            if (Ip::ipMatches($ip, $trusted)) {
173ced0b55fSAndreas Gohr                return true; // The given IP matches one of the trusted proxies.
174c7f6b7b7SZebra North            }
175c7f6b7b7SZebra North        }
176c7f6b7b7SZebra North
177ced0b55fSAndreas Gohr        return false; // none of the proxies matched
178c7f6b7b7SZebra North    }
179c7f6b7b7SZebra North
180c7f6b7b7SZebra North    /**
181c7f6b7b7SZebra North     * Get the originating IP address and the address of every proxy that the
182c7f6b7b7SZebra North     * request has passed through, according to the X-Forwarded-For header.
183c7f6b7b7SZebra North     *
184c7f6b7b7SZebra North     * To prevent spoofing of the client IP, every proxy listed in the
185c7f6b7b7SZebra North     * X-Forwarded-For header must be trusted, as well as the TCP/IP endpoint
186c7f6b7b7SZebra North     * from which the connection was received (i.e. the final proxy).
187c7f6b7b7SZebra North     *
188c7f6b7b7SZebra North     * If the header is not present or contains an untrusted proxy then
189c7f6b7b7SZebra North     * an empty array is returned.
190c7f6b7b7SZebra North     *
191c7f6b7b7SZebra North     * The client IP is the first entry in the returned list, followed by the
192c7f6b7b7SZebra North     * proxies.
193c7f6b7b7SZebra North     *
194c7f6b7b7SZebra North     * @return string[] Returns an array of IP addresses.
195c7f6b7b7SZebra North     */
196c7f6b7b7SZebra North    public static function forwardedFor(): array
197c7f6b7b7SZebra North    {
198c7f6b7b7SZebra North        /* @var Input $INPUT */
199c7f6b7b7SZebra North        global $INPUT, $conf;
200c7f6b7b7SZebra North
201c7f6b7b7SZebra North        $forwardedFor = $INPUT->server->str('HTTP_X_FORWARDED_FOR');
202c7f6b7b7SZebra North
203ced0b55fSAndreas Gohr        if (empty($conf['trustedproxies']) || !$forwardedFor) {
204c7f6b7b7SZebra North            return [];
205c7f6b7b7SZebra North        }
206c7f6b7b7SZebra North
207c7f6b7b7SZebra North        // This is the address from which the header was received.
208c7f6b7b7SZebra North        $remoteAddr = $INPUT->server->str('REMOTE_ADDR');
209c7f6b7b7SZebra North
210c7f6b7b7SZebra North        // Get the client address from the X-Forwarded-For header.
211c7f6b7b7SZebra North        // X-Forwarded-For: <client> [, <proxy>]...
212c7f6b7b7SZebra North        $forwardedFor = explode(',', str_replace(' ', '', $forwardedFor));
213c7f6b7b7SZebra North
214c7f6b7b7SZebra North        // The client address is the first item, remove it from the list.
215c7f6b7b7SZebra North        $clientAddress = array_shift($forwardedFor);
216c7f6b7b7SZebra North
217c7f6b7b7SZebra North        // The remaining items are the proxies through which the X-Forwarded-For
218c7f6b7b7SZebra North        // header has passed.  The final proxy is the connection's remote address.
219c7f6b7b7SZebra North        $proxies = $forwardedFor;
220c7f6b7b7SZebra North        $proxies[] = $remoteAddr;
221c7f6b7b7SZebra North
222c7f6b7b7SZebra North        // Ensure that every proxy is trusted.
223c7f6b7b7SZebra North        foreach ($proxies as $proxy) {
224c7f6b7b7SZebra North            if (!Ip::proxyIsTrusted($proxy)) {
225c7f6b7b7SZebra North                return [];
226c7f6b7b7SZebra North            }
227c7f6b7b7SZebra North        }
228c7f6b7b7SZebra North
229c7f6b7b7SZebra North        // Add the client address before the list of proxies.
230c7f6b7b7SZebra North        return array_merge([$clientAddress], $proxies);
231c7f6b7b7SZebra North    }
232c7f6b7b7SZebra North
233c7f6b7b7SZebra North    /**
234c7f6b7b7SZebra North     * Return the IP of the client.
235c7f6b7b7SZebra North     *
236c7f6b7b7SZebra North     * The IP is sourced from, in order of preference:
237c7f6b7b7SZebra North     *
238c7f6b7b7SZebra North     *   - The X-Real-IP header if $conf[realip] is true.
239c7f6b7b7SZebra North     *   - The X-Forwarded-For header if all the proxies are trusted by $conf[trustedproxy].
240c7f6b7b7SZebra North     *   - The TCP/IP connection remote address.
241c7f6b7b7SZebra North     *   - 0.0.0.0 if all else fails.
242c7f6b7b7SZebra North     *
243c7f6b7b7SZebra North     * The 'realip' config value should only be set to true if the X-Real-IP header
244c7f6b7b7SZebra North     * is being added by the web server, otherwise it may be spoofed by the client.
245c7f6b7b7SZebra North     *
246c7f6b7b7SZebra North     * The 'trustedproxy' setting must not allow any IP, otherwise the X-Forwarded-For
247c7f6b7b7SZebra North     * may be spoofed by the client.
248c7f6b7b7SZebra North     *
249c7f6b7b7SZebra North     * @return string Returns an IPv4 or IPv6 address.
250c7f6b7b7SZebra North     */
251c7f6b7b7SZebra North    public static function clientIp(): string
252c7f6b7b7SZebra North    {
253c7f6b7b7SZebra North        return Ip::clientIps()[0];
254c7f6b7b7SZebra North    }
255c7f6b7b7SZebra North
256c7f6b7b7SZebra North    /**
257c7f6b7b7SZebra North     * Return the IP of the client and the proxies through which the connection has passed.
258c7f6b7b7SZebra North     *
259c7f6b7b7SZebra North     * The IPs are sourced from, in order of preference:
260c7f6b7b7SZebra North     *
261c7f6b7b7SZebra North     *   - The X-Real-IP header if $conf[realip] is true.
26219d5ba27SAndreas Gohr     *   - The X-Forwarded-For header if all the proxies are trusted by $conf[trustedproxies].
263c7f6b7b7SZebra North     *   - The TCP/IP connection remote address.
264c7f6b7b7SZebra North     *   - 0.0.0.0 if all else fails.
265c7f6b7b7SZebra North     *
266c7f6b7b7SZebra North     * @return string[] Returns an array of IPv4 or IPv6 addresses.
267c7f6b7b7SZebra North     */
268c7f6b7b7SZebra North    public static function clientIps(): array
269c7f6b7b7SZebra North    {
270c7f6b7b7SZebra North        /* @var Input $INPUT */
271c7f6b7b7SZebra North        global $INPUT, $conf;
272c7f6b7b7SZebra North
273c7f6b7b7SZebra North        // IPs in order of most to least preferred.
274c7f6b7b7SZebra North        $ips = [];
275c7f6b7b7SZebra North
276c7f6b7b7SZebra North        // Use the X-Real-IP header if it is enabled by the configuration.
277c7f6b7b7SZebra North        if (!empty($conf['realip']) && $INPUT->server->str('HTTP_X_REAL_IP')) {
278c7f6b7b7SZebra North            $ips[] = $INPUT->server->str('HTTP_X_REAL_IP');
279c7f6b7b7SZebra North        }
280c7f6b7b7SZebra North
281c7f6b7b7SZebra North        // Add the X-Forwarded-For addresses if all proxies are trusted.
282c7f6b7b7SZebra North        $ips = array_merge($ips, Ip::forwardedFor());
283c7f6b7b7SZebra North
284c7f6b7b7SZebra North        // Add the TCP/IP connection endpoint.
285c7f6b7b7SZebra North        $ips[] = $INPUT->server->str('REMOTE_ADDR');
286c7f6b7b7SZebra North
287c7f6b7b7SZebra North        // Remove invalid IPs.
288e449acd0SAndreas Gohr        $ips = array_filter($ips, static fn($ip) => filter_var($ip, FILTER_VALIDATE_IP));
289c7f6b7b7SZebra North
290c7f6b7b7SZebra North        // Remove duplicated IPs.
291c7f6b7b7SZebra North        $ips = array_values(array_unique($ips));
292c7f6b7b7SZebra North
293c7f6b7b7SZebra North        // Add a fallback if for some reason there were no valid IPs.
294c7f6b7b7SZebra North        if (!$ips) {
295c7f6b7b7SZebra North            $ips[] = '0.0.0.0';
296c7f6b7b7SZebra North        }
297c7f6b7b7SZebra North
298c7f6b7b7SZebra North        return $ips;
299c7f6b7b7SZebra North    }
30033cb4e01SAndreas Gohr
30133cb4e01SAndreas Gohr    /**
30233cb4e01SAndreas Gohr     * Get the host name of the server.
30333cb4e01SAndreas Gohr     *
30433cb4e01SAndreas Gohr     * The host name is sourced from, in order of preference:
30533cb4e01SAndreas Gohr     *
30633cb4e01SAndreas Gohr     *   - The X-Forwarded-Host header if it exists and the proxies are trusted.
30733cb4e01SAndreas Gohr     *   - The HTTP_HOST header.
30833cb4e01SAndreas Gohr     *   - The SERVER_NAME header.
30933cb4e01SAndreas Gohr     *   - The system's host name.
31033cb4e01SAndreas Gohr     *
31133cb4e01SAndreas Gohr     * @return string Returns the host name of the server.
31233cb4e01SAndreas Gohr     */
31333cb4e01SAndreas Gohr    public static function hostName(): string
31433cb4e01SAndreas Gohr    {
31533cb4e01SAndreas Gohr        /* @var Input $INPUT */
31633cb4e01SAndreas Gohr        global $INPUT;
31733cb4e01SAndreas Gohr
3187caad012SAndreas Gohr        $remoteAddr = $INPUT->server->str('REMOTE_ADDR');
3197caad012SAndreas Gohr        if ($INPUT->server->str('HTTP_X_FORWARDED_HOST') && self::proxyIsTrusted($remoteAddr)) {
32033cb4e01SAndreas Gohr            return $INPUT->server->str('HTTP_X_FORWARDED_HOST');
32133cb4e01SAndreas Gohr        } elseif ($INPUT->server->str('HTTP_HOST')) {
32233cb4e01SAndreas Gohr            return $INPUT->server->str('HTTP_HOST');
32333cb4e01SAndreas Gohr        } elseif ($INPUT->server->str('SERVER_NAME')) {
32433cb4e01SAndreas Gohr            return $INPUT->server->str('SERVER_NAME');
32533cb4e01SAndreas Gohr        } else {
32633cb4e01SAndreas Gohr            return php_uname('n');
32733cb4e01SAndreas Gohr        }
32833cb4e01SAndreas Gohr    }
32933cb4e01SAndreas Gohr
33033cb4e01SAndreas Gohr    /**
33133cb4e01SAndreas Gohr     * Is the connection using the HTTPS protocol?
33233cb4e01SAndreas Gohr     *
33333cb4e01SAndreas Gohr     * Will use the X-Forwarded-Proto header if it exists and the proxies are trusted, otherwise
33433cb4e01SAndreas Gohr     * the HTTPS environment is used.
33533cb4e01SAndreas Gohr     *
33633cb4e01SAndreas Gohr     * @return bool
33733cb4e01SAndreas Gohr     */
33833cb4e01SAndreas Gohr    public static function isSsl(): bool
33933cb4e01SAndreas Gohr    {
34033cb4e01SAndreas Gohr        /* @var Input $INPUT */
34133cb4e01SAndreas Gohr        global $INPUT;
34233cb4e01SAndreas Gohr
3437caad012SAndreas Gohr        $remoteAddr = $INPUT->server->str('REMOTE_ADDR');
3447caad012SAndreas Gohr        if ($INPUT->server->has('HTTP_X_FORWARDED_PROTO') && self::proxyIsTrusted($remoteAddr)) {
34533cb4e01SAndreas Gohr            return $INPUT->server->str('HTTP_X_FORWARDED_PROTO') === 'https';
34633cb4e01SAndreas Gohr        }
3477caad012SAndreas Gohr        return !preg_match('/^(|off|false|disabled)$/i', $INPUT->server->str('HTTPS', 'off'));
34833cb4e01SAndreas Gohr    }
349c7f6b7b7SZebra North}
350