FirewallAttribute.cs 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112
  1. using CacheManager.Core;
  2. using Hangfire;
  3. using Masuit.MyBlogs.Core.Common;
  4. using Masuit.MyBlogs.Core.Configs;
  5. using Masuit.MyBlogs.Core.Extensions.Hangfire;
  6. using Masuit.Tools;
  7. using Masuit.Tools.AspNetCore.Mime;
  8. using Masuit.Tools.Logging;
  9. using Masuit.Tools.Security;
  10. using Masuit.Tools.Strings;
  11. using Microsoft.AspNetCore.Http;
  12. using Microsoft.AspNetCore.Mvc;
  13. using Microsoft.AspNetCore.Mvc.Filters;
  14. using System;
  15. using System.Linq;
  16. using System.Net;
  17. using System.Text;
  18. using System.Text.RegularExpressions;
  19. using System.Web;
  20. using HeaderNames = Microsoft.Net.Http.Headers.HeaderNames;
  21. namespace Masuit.MyBlogs.Core.Extensions.Firewall
  22. {
  23. public class FirewallAttribute : ActionFilterAttribute
  24. {
  25. public ICacheManager<int> CacheManager { get; set; }
  26. public IFirewallRepoter FirewallRepoter { get; set; }
  27. /// <inheritdoc />
  28. public override void OnActionExecuting(ActionExecutingContext context)
  29. {
  30. var request = context.HttpContext.Request;
  31. var ip = context.HttpContext.Connection.RemoteIpAddress.ToString();
  32. var tokenValid = request.Cookies["Email"].MDString3(AppConfig.BaiduAK).Equals(request.Cookies["FullAccessToken"]);
  33. if (ip.IsDenyIpAddress() && !tokenValid)
  34. {
  35. AccessDeny(ip, request, "黑名单IP地址");
  36. context.Result = new BadRequestObjectResult("您当前所在的网络环境不支持访问本站!");
  37. return;
  38. }
  39. if (CommonHelper.SystemSettings.GetOrAdd("FirewallEnabled", "true") == "false" || context.Filters.Any(m => m.ToString().Contains(nameof(AllowAccessFirewallAttribute))) || tokenValid)
  40. {
  41. return;
  42. }
  43. var ua = request.Headers[HeaderNames.UserAgent] + "";
  44. var agent = UserAgent.Parse(ua);
  45. var blocked = CommonHelper.SystemSettings.GetOrAdd("UserAgentBlocked", "").Split(new[] { ',', '|' }, StringSplitOptions.RemoveEmptyEntries);
  46. if (ua.Contains(blocked))
  47. {
  48. AccessDeny(ip, request, $"UA黑名单({agent.Browser} {agent.BrowserVersion}/{agent.Platform})");
  49. var msg = CommonHelper.SystemSettings.GetOrAdd("UserAgentBlockedMsg", "当前浏览器不支持访问本站");
  50. context.Result = new ContentResult()
  51. {
  52. Content = Template.Create(msg).Set("browser", agent.Browser + " " + agent.BrowserVersion).Set("os", agent.Platform).Render(),
  53. ContentType = ContentType.Html,
  54. StatusCode = 403
  55. };
  56. return;
  57. }
  58. if (ip.IsInDenyArea() && !tokenValid)
  59. {
  60. AccessDeny(ip, request, "访问地区限制");
  61. throw new AccessDenyException("访问地区限制");
  62. }
  63. if (Regex.IsMatch(request.Method, "OPTIONS|HEAD", RegexOptions.IgnoreCase) || agent.IsRobot)
  64. {
  65. return;
  66. }
  67. var times = CacheManager.AddOrUpdate("Frequency:" + ip, 1, i => i + 1, 5);
  68. CacheManager.Expire("Frequency:" + ip, ExpirationMode.Sliding, TimeSpan.FromSeconds(CommonHelper.SystemSettings.GetOrAdd("LimitIPFrequency", "60").ToInt32()));
  69. var limit = CommonHelper.SystemSettings.GetOrAdd("LimitIPRequestTimes", "90").ToInt32();
  70. if (times <= limit)
  71. {
  72. return;
  73. }
  74. if (times > limit * 1.2)
  75. {
  76. CacheManager.Expire("Frequency:" + ip, ExpirationMode.Sliding, TimeSpan.FromMinutes(CommonHelper.SystemSettings.GetOrAdd("BanIPTimespan", "10").ToInt32()));
  77. AccessDeny(ip, request, "访问频次限制");
  78. }
  79. throw new TempDenyException("访问频次限制");
  80. }
  81. private async void AccessDeny(string ip, HttpRequest request, string remark)
  82. {
  83. var path = HttpUtility.UrlDecode(request.Path + request.QueryString, Encoding.UTF8);
  84. BackgroundJob.Enqueue(() => HangfireBackJob.InterceptLog(new IpIntercepter()
  85. {
  86. IP = ip,
  87. RequestUrl = HttpUtility.UrlDecode(request.Scheme + "://" + request.Host + path),
  88. Time = DateTime.Now,
  89. UserAgent = request.Headers[HeaderNames.UserAgent],
  90. Remark = remark
  91. }));
  92. var limit = CommonHelper.SystemSettings.GetOrAdd("LimitIPInterceptTimes", "30").ToInt32();
  93. await RedisHelper.LRangeAsync<IpIntercepter>("intercept", 0, -1).ContinueWith(async t =>
  94. {
  95. if (t.Result.Count(x => x.IP == ip) >= limit)
  96. {
  97. LogManager.Info($"准备上报IP{ip}到{FirewallRepoter.ReporterName}");
  98. await FirewallRepoter.ReportAsync(IPAddress.Parse(ip)).ContinueWith(_ => LogManager.Info($"访问频次限制,已上报IP{ip}至:" + FirewallRepoter.ReporterName));
  99. }
  100. });
  101. }
  102. }
  103. }