defendermem.go 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326
  1. package common
  2. import (
  3. "sort"
  4. "time"
  5. "github.com/drakkan/sftpgo/v2/dataprovider"
  6. "github.com/drakkan/sftpgo/v2/util"
  7. )
  8. type memoryDefender struct {
  9. baseDefender
  10. // IP addresses of the clients trying to connected are stored inside hosts,
  11. // they are added to banned once the thresold is reached.
  12. // A violation from a banned host will increase the ban time
  13. // based on the configured BanTimeIncrement
  14. hosts map[string]hostScore // the key is the host IP
  15. banned map[string]time.Time // the key is the host IP
  16. }
  17. func newInMemoryDefender(config *DefenderConfig) (Defender, error) {
  18. err := config.validate()
  19. if err != nil {
  20. return nil, err
  21. }
  22. defender := &memoryDefender{
  23. baseDefender: baseDefender{
  24. config: config,
  25. },
  26. hosts: make(map[string]hostScore),
  27. banned: make(map[string]time.Time),
  28. }
  29. if err := defender.Reload(); err != nil {
  30. return nil, err
  31. }
  32. return defender, nil
  33. }
  34. // GetHosts returns hosts that are banned or for which some violations have been detected
  35. func (d *memoryDefender) GetHosts() ([]dataprovider.DefenderEntry, error) {
  36. d.RLock()
  37. defer d.RUnlock()
  38. var result []dataprovider.DefenderEntry
  39. for k, v := range d.banned {
  40. if v.After(time.Now()) {
  41. result = append(result, dataprovider.DefenderEntry{
  42. IP: k,
  43. BanTime: v,
  44. })
  45. }
  46. }
  47. for k, v := range d.hosts {
  48. score := 0
  49. for _, event := range v.Events {
  50. if event.dateTime.Add(time.Duration(d.config.ObservationTime) * time.Minute).After(time.Now()) {
  51. score += event.score
  52. }
  53. }
  54. if score > 0 {
  55. result = append(result, dataprovider.DefenderEntry{
  56. IP: k,
  57. Score: score,
  58. })
  59. }
  60. }
  61. return result, nil
  62. }
  63. // GetHost returns a defender host by ip, if any
  64. func (d *memoryDefender) GetHost(ip string) (dataprovider.DefenderEntry, error) {
  65. d.RLock()
  66. defer d.RUnlock()
  67. if banTime, ok := d.banned[ip]; ok {
  68. if banTime.After(time.Now()) {
  69. return dataprovider.DefenderEntry{
  70. IP: ip,
  71. BanTime: banTime,
  72. }, nil
  73. }
  74. }
  75. if hs, ok := d.hosts[ip]; ok {
  76. score := 0
  77. for _, event := range hs.Events {
  78. if event.dateTime.Add(time.Duration(d.config.ObservationTime) * time.Minute).After(time.Now()) {
  79. score += event.score
  80. }
  81. }
  82. if score > 0 {
  83. return dataprovider.DefenderEntry{
  84. IP: ip,
  85. Score: score,
  86. }, nil
  87. }
  88. }
  89. return dataprovider.DefenderEntry{}, util.NewRecordNotFoundError("host not found")
  90. }
  91. // IsBanned returns true if the specified IP is banned
  92. // and increase ban time if the IP is found.
  93. // This method must be called as soon as the client connects
  94. func (d *memoryDefender) IsBanned(ip string) bool {
  95. d.RLock()
  96. if banTime, ok := d.banned[ip]; ok {
  97. if banTime.After(time.Now()) {
  98. increment := d.config.BanTime * d.config.BanTimeIncrement / 100
  99. if increment == 0 {
  100. increment++
  101. }
  102. d.RUnlock()
  103. // we can save an earlier ban time if there are contemporary updates
  104. // but this should not make much difference. I prefer to hold a read lock
  105. // until possible for performance reasons, this method is called each
  106. // time a new client connects and it must be as fast as possible
  107. d.Lock()
  108. d.banned[ip] = banTime.Add(time.Duration(increment) * time.Minute)
  109. d.Unlock()
  110. return true
  111. }
  112. }
  113. defer d.RUnlock()
  114. return d.baseDefender.isBanned(ip)
  115. }
  116. // DeleteHost removes the specified IP from the defender lists
  117. func (d *memoryDefender) DeleteHost(ip string) bool {
  118. d.Lock()
  119. defer d.Unlock()
  120. if _, ok := d.banned[ip]; ok {
  121. delete(d.banned, ip)
  122. return true
  123. }
  124. if _, ok := d.hosts[ip]; ok {
  125. delete(d.hosts, ip)
  126. return true
  127. }
  128. return false
  129. }
  130. // AddEvent adds an event for the given IP.
  131. // This method must be called for clients not yet banned
  132. func (d *memoryDefender) AddEvent(ip string, event HostEvent) {
  133. d.Lock()
  134. defer d.Unlock()
  135. if d.safeList != nil && d.safeList.isListed(ip) {
  136. return
  137. }
  138. // ignore events for already banned hosts
  139. if v, ok := d.banned[ip]; ok {
  140. if v.After(time.Now()) {
  141. return
  142. }
  143. delete(d.banned, ip)
  144. }
  145. score := d.baseDefender.getScore(event)
  146. ev := hostEvent{
  147. dateTime: time.Now(),
  148. score: score,
  149. }
  150. if hs, ok := d.hosts[ip]; ok {
  151. hs.Events = append(hs.Events, ev)
  152. hs.TotalScore = 0
  153. idx := 0
  154. for _, event := range hs.Events {
  155. if event.dateTime.Add(time.Duration(d.config.ObservationTime) * time.Minute).After(time.Now()) {
  156. hs.Events[idx] = event
  157. hs.TotalScore += event.score
  158. idx++
  159. }
  160. }
  161. hs.Events = hs.Events[:idx]
  162. if hs.TotalScore >= d.config.Threshold {
  163. d.banned[ip] = time.Now().Add(time.Duration(d.config.BanTime) * time.Minute)
  164. delete(d.hosts, ip)
  165. d.cleanupBanned()
  166. } else {
  167. d.hosts[ip] = hs
  168. }
  169. } else {
  170. d.hosts[ip] = hostScore{
  171. TotalScore: ev.score,
  172. Events: []hostEvent{ev},
  173. }
  174. d.cleanupHosts()
  175. }
  176. }
  177. func (d *memoryDefender) countBanned() int {
  178. d.RLock()
  179. defer d.RUnlock()
  180. return len(d.banned)
  181. }
  182. func (d *memoryDefender) countHosts() int {
  183. d.RLock()
  184. defer d.RUnlock()
  185. return len(d.hosts)
  186. }
  187. // GetBanTime returns the ban time for the given IP or nil if the IP is not banned
  188. func (d *memoryDefender) GetBanTime(ip string) (*time.Time, error) {
  189. d.RLock()
  190. defer d.RUnlock()
  191. if banTime, ok := d.banned[ip]; ok {
  192. return &banTime, nil
  193. }
  194. return nil, nil
  195. }
  196. // GetScore returns the score for the given IP
  197. func (d *memoryDefender) GetScore(ip string) (int, error) {
  198. d.RLock()
  199. defer d.RUnlock()
  200. score := 0
  201. if hs, ok := d.hosts[ip]; ok {
  202. for _, event := range hs.Events {
  203. if event.dateTime.Add(time.Duration(d.config.ObservationTime) * time.Minute).After(time.Now()) {
  204. score += event.score
  205. }
  206. }
  207. }
  208. return score, nil
  209. }
  210. func (d *memoryDefender) cleanupBanned() {
  211. if len(d.banned) > d.config.EntriesHardLimit {
  212. kvList := make(kvList, 0, len(d.banned))
  213. for k, v := range d.banned {
  214. if v.Before(time.Now()) {
  215. delete(d.banned, k)
  216. }
  217. kvList = append(kvList, kv{
  218. Key: k,
  219. Value: v.UnixNano(),
  220. })
  221. }
  222. // we removed expired ip addresses, if any, above, this could be enough
  223. numToRemove := len(d.banned) - d.config.EntriesSoftLimit
  224. if numToRemove <= 0 {
  225. return
  226. }
  227. sort.Sort(kvList)
  228. for idx, kv := range kvList {
  229. if idx >= numToRemove {
  230. break
  231. }
  232. delete(d.banned, kv.Key)
  233. }
  234. }
  235. }
  236. func (d *memoryDefender) cleanupHosts() {
  237. if len(d.hosts) > d.config.EntriesHardLimit {
  238. kvList := make(kvList, 0, len(d.hosts))
  239. for k, v := range d.hosts {
  240. value := int64(0)
  241. if len(v.Events) > 0 {
  242. value = v.Events[len(v.Events)-1].dateTime.UnixNano()
  243. }
  244. kvList = append(kvList, kv{
  245. Key: k,
  246. Value: value,
  247. })
  248. }
  249. sort.Sort(kvList)
  250. numToRemove := len(d.hosts) - d.config.EntriesSoftLimit
  251. for idx, kv := range kvList {
  252. if idx >= numToRemove {
  253. break
  254. }
  255. delete(d.hosts, kv.Key)
  256. }
  257. }
  258. }
  259. type kv struct {
  260. Key string
  261. Value int64
  262. }
  263. type kvList []kv
  264. func (p kvList) Len() int { return len(p) }
  265. func (p kvList) Less(i, j int) bool { return p[i].Value < p[j].Value }
  266. func (p kvList) Swap(i, j int) { p[i], p[j] = p[j], p[i] }