3 * Functions for dealing with proxies
9 * Extracts the XFF string from the request header
10 * Note: headers are spoofable
13 function wfGetForwardedFor() {
14 $apacheHeaders = function_exists( 'apache_request_headers' ) ?
apache_request_headers() : null;
15 if( is_array( $apacheHeaders ) ) {
16 // More reliable than $_SERVER due to case and -/_ folding
18 foreach ( $apacheHeaders as $tempName => $tempValue ) {
19 $set[ strtoupper( $tempName ) ] = $tempValue;
21 $index = strtoupper ( 'X-Forwarded-For' );
23 // Subject to spoofing with headers like X_Forwarded_For
25 $index = 'HTTP_X_FORWARDED_FOR';
28 #Try to see if XFF is set
29 if( isset( $set[$index] ) ) {
37 * Returns the browser/OS data from the request header
38 * Note: headers are spoofable
40 * @deprecated in 1.18; use $wgRequest->getHeader( 'User-Agent' ) instead.
43 function wfGetAgent() {
44 wfDeprecated( __FUNCTION__
);
45 if( function_exists( 'apache_request_headers' ) ) {
46 // More reliable than $_SERVER due to case and -/_ folding
48 foreach ( apache_request_headers() as $tempName => $tempValue ) {
49 $set[ strtoupper( $tempName ) ] = $tempValue;
51 $index = strtoupper ( 'User-Agent' );
53 // Subject to spoofing with headers like X_Forwarded_For
55 $index = 'HTTP_USER_AGENT';
57 if( isset( $set[$index] ) ) {
65 * Work out the IP address based on various globals
66 * For trusted proxies, use the XFF client IP (first of the chain)
70 global $wgUsePrivateIPs, $wgCommandLineMode;
73 # Return cached result
74 if ( !empty( $ip ) ) {
78 /* collect the originating ips */
79 # Client connecting to this webserver
80 if ( isset( $_SERVER['REMOTE_ADDR'] ) ) {
81 $ip = IP
::canonicalize( $_SERVER['REMOTE_ADDR'] );
82 } elseif( $wgCommandLineMode ) {
87 $forwardedFor = wfGetForwardedFor();
88 if ( $forwardedFor !== null ) {
89 $ipchain = array_map( 'trim', explode( ',', $forwardedFor ) );
90 $ipchain = array_reverse( $ipchain );
92 array_unshift( $ipchain, $ip );
95 # Step through XFF list and find the last address in the list which is a trusted server
96 # Set $ip to the IP address given by that trusted server, unless the address is not sensible (e.g. private)
97 foreach ( $ipchain as $i => $curIP ) {
98 $curIP = IP
::canonicalize( $curIP );
99 if ( wfIsTrustedProxy( $curIP ) ) {
100 if ( isset( $ipchain[$i +
1] ) ) {
101 if( $wgUsePrivateIPs || IP
::isPublic( $ipchain[$i +
1 ] ) ) {
102 $ip = $ipchain[$i +
1];
111 # Allow extensions to improve our guess
112 wfRunHooks( 'GetIP', array( &$ip ) );
115 throw new MWException( "Unable to determine IP" );
118 wfDebug( "IP: $ip\n" );
123 * Checks if an IP is a trusted proxy providor
124 * Useful to tell if X-Fowarded-For data is possibly bogus
125 * Squid cache servers for the site and AOL are whitelisted
129 function wfIsTrustedProxy( $ip ) {
130 global $wgSquidServers, $wgSquidServersNoPurge;
132 $trusted = in_array( $ip, $wgSquidServers ) ||
133 in_array( $ip, $wgSquidServersNoPurge );
134 wfRunHooks( 'IsTrustedProxy', array( &$ip, &$trusted ) );
139 * Forks processes to scan the originating IP for an open proxy server
140 * MemCached can be used to skip IPs that have already been scanned
142 function wfProxyCheck() {
143 global $wgBlockOpenProxies, $wgProxyPorts, $wgProxyScriptPath;
144 global $wgMemc, $wgProxyMemcExpiry;
147 if ( !$wgBlockOpenProxies ) {
154 $mcKey = wfMemcKey( 'proxy', 'ip', $ip );
155 $mcValue = $wgMemc->get( $mcKey );
156 $skip = (bool)$mcValue;
160 $title = SpecialPage
::getTitleFor( 'Blockme' );
161 $iphash = md5( $ip . $wgProxyKey );
162 $url = $title->getFullURL( 'ip='.$iphash );
164 foreach ( $wgProxyPorts as $port ) {
165 $params = implode( ' ', array(
166 escapeshellarg( $wgProxyScriptPath ),
167 escapeshellarg( $ip ),
168 escapeshellarg( $port ),
169 escapeshellarg( $url )
171 exec( "php $params >" . wfGetNull() . " 2>&1 &" );
174 $wgMemc->set( $mcKey, 1, $wgProxyMemcExpiry );