defendermem.go 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346
  1. // Copyright (C) 2019-2022 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package common
  15. import (
  16. "sort"
  17. "time"
  18. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  19. "github.com/drakkan/sftpgo/v2/internal/util"
  20. )
  21. type memoryDefender struct {
  22. baseDefender
  23. // IP addresses of the clients trying to connected are stored inside hosts,
  24. // they are added to banned once the thresold is reached.
  25. // A violation from a banned host will increase the ban time
  26. // based on the configured BanTimeIncrement
  27. hosts map[string]hostScore // the key is the host IP
  28. banned map[string]time.Time // the key is the host IP
  29. }
  30. func newInMemoryDefender(config *DefenderConfig) (Defender, error) {
  31. err := config.validate()
  32. if err != nil {
  33. return nil, err
  34. }
  35. defender := &memoryDefender{
  36. baseDefender: baseDefender{
  37. config: config,
  38. },
  39. hosts: make(map[string]hostScore),
  40. banned: make(map[string]time.Time),
  41. }
  42. if err := defender.Reload(); err != nil {
  43. return nil, err
  44. }
  45. return defender, nil
  46. }
  47. // GetHosts returns hosts that are banned or for which some violations have been detected
  48. func (d *memoryDefender) GetHosts() ([]dataprovider.DefenderEntry, error) {
  49. d.RLock()
  50. defer d.RUnlock()
  51. var result []dataprovider.DefenderEntry
  52. for k, v := range d.banned {
  53. if v.After(time.Now()) {
  54. result = append(result, dataprovider.DefenderEntry{
  55. IP: k,
  56. BanTime: v,
  57. })
  58. }
  59. }
  60. for k, v := range d.hosts {
  61. score := 0
  62. for _, event := range v.Events {
  63. if event.dateTime.Add(time.Duration(d.config.ObservationTime) * time.Minute).After(time.Now()) {
  64. score += event.score
  65. }
  66. }
  67. if score > 0 {
  68. result = append(result, dataprovider.DefenderEntry{
  69. IP: k,
  70. Score: score,
  71. })
  72. }
  73. }
  74. return result, nil
  75. }
  76. // GetHost returns a defender host by ip, if any
  77. func (d *memoryDefender) GetHost(ip string) (dataprovider.DefenderEntry, error) {
  78. d.RLock()
  79. defer d.RUnlock()
  80. if banTime, ok := d.banned[ip]; ok {
  81. if banTime.After(time.Now()) {
  82. return dataprovider.DefenderEntry{
  83. IP: ip,
  84. BanTime: banTime,
  85. }, nil
  86. }
  87. }
  88. if hs, ok := d.hosts[ip]; ok {
  89. score := 0
  90. for _, event := range hs.Events {
  91. if event.dateTime.Add(time.Duration(d.config.ObservationTime) * time.Minute).After(time.Now()) {
  92. score += event.score
  93. }
  94. }
  95. if score > 0 {
  96. return dataprovider.DefenderEntry{
  97. IP: ip,
  98. Score: score,
  99. }, nil
  100. }
  101. }
  102. return dataprovider.DefenderEntry{}, util.NewRecordNotFoundError("host not found")
  103. }
  104. // IsBanned returns true if the specified IP is banned
  105. // and increase ban time if the IP is found.
  106. // This method must be called as soon as the client connects
  107. func (d *memoryDefender) IsBanned(ip string) bool {
  108. d.RLock()
  109. if banTime, ok := d.banned[ip]; ok {
  110. if banTime.After(time.Now()) {
  111. increment := d.config.BanTime * d.config.BanTimeIncrement / 100
  112. if increment == 0 {
  113. increment++
  114. }
  115. d.RUnlock()
  116. // we can save an earlier ban time if there are contemporary updates
  117. // but this should not make much difference. I prefer to hold a read lock
  118. // until possible for performance reasons, this method is called each
  119. // time a new client connects and it must be as fast as possible
  120. d.Lock()
  121. d.banned[ip] = banTime.Add(time.Duration(increment) * time.Minute)
  122. d.Unlock()
  123. return true
  124. }
  125. }
  126. defer d.RUnlock()
  127. return d.baseDefender.isBanned(ip)
  128. }
  129. // DeleteHost removes the specified IP from the defender lists
  130. func (d *memoryDefender) DeleteHost(ip string) bool {
  131. d.Lock()
  132. defer d.Unlock()
  133. if _, ok := d.banned[ip]; ok {
  134. delete(d.banned, ip)
  135. return true
  136. }
  137. if _, ok := d.hosts[ip]; ok {
  138. delete(d.hosts, ip)
  139. return true
  140. }
  141. return false
  142. }
  143. // AddEvent adds an event for the given IP.
  144. // This method must be called for clients not yet banned
  145. func (d *memoryDefender) AddEvent(ip string, event HostEvent) {
  146. d.Lock()
  147. defer d.Unlock()
  148. if d.safeList != nil && d.safeList.isListed(ip) {
  149. return
  150. }
  151. // ignore events for already banned hosts
  152. if v, ok := d.banned[ip]; ok {
  153. if v.After(time.Now()) {
  154. return
  155. }
  156. delete(d.banned, ip)
  157. }
  158. score := d.baseDefender.getScore(event)
  159. ev := hostEvent{
  160. dateTime: time.Now(),
  161. score: score,
  162. }
  163. if hs, ok := d.hosts[ip]; ok {
  164. hs.Events = append(hs.Events, ev)
  165. hs.TotalScore = 0
  166. idx := 0
  167. for _, event := range hs.Events {
  168. if event.dateTime.Add(time.Duration(d.config.ObservationTime) * time.Minute).After(time.Now()) {
  169. hs.Events[idx] = event
  170. hs.TotalScore += event.score
  171. idx++
  172. }
  173. }
  174. hs.Events = hs.Events[:idx]
  175. if hs.TotalScore >= d.config.Threshold {
  176. d.banned[ip] = time.Now().Add(time.Duration(d.config.BanTime) * time.Minute)
  177. delete(d.hosts, ip)
  178. d.cleanupBanned()
  179. eventManager.handleIPBlockedEvent(EventParams{
  180. Event: ipBlockedEventName,
  181. IP: ip,
  182. Timestamp: time.Now().UnixNano(),
  183. Status: 1,
  184. })
  185. } else {
  186. d.hosts[ip] = hs
  187. }
  188. } else {
  189. d.hosts[ip] = hostScore{
  190. TotalScore: ev.score,
  191. Events: []hostEvent{ev},
  192. }
  193. d.cleanupHosts()
  194. }
  195. }
  196. func (d *memoryDefender) countBanned() int {
  197. d.RLock()
  198. defer d.RUnlock()
  199. return len(d.banned)
  200. }
  201. func (d *memoryDefender) countHosts() int {
  202. d.RLock()
  203. defer d.RUnlock()
  204. return len(d.hosts)
  205. }
  206. // GetBanTime returns the ban time for the given IP or nil if the IP is not banned
  207. func (d *memoryDefender) GetBanTime(ip string) (*time.Time, error) {
  208. d.RLock()
  209. defer d.RUnlock()
  210. if banTime, ok := d.banned[ip]; ok {
  211. return &banTime, nil
  212. }
  213. return nil, nil
  214. }
  215. // GetScore returns the score for the given IP
  216. func (d *memoryDefender) GetScore(ip string) (int, error) {
  217. d.RLock()
  218. defer d.RUnlock()
  219. score := 0
  220. if hs, ok := d.hosts[ip]; ok {
  221. for _, event := range hs.Events {
  222. if event.dateTime.Add(time.Duration(d.config.ObservationTime) * time.Minute).After(time.Now()) {
  223. score += event.score
  224. }
  225. }
  226. }
  227. return score, nil
  228. }
  229. func (d *memoryDefender) cleanupBanned() {
  230. if len(d.banned) > d.config.EntriesHardLimit {
  231. kvList := make(kvList, 0, len(d.banned))
  232. for k, v := range d.banned {
  233. if v.Before(time.Now()) {
  234. delete(d.banned, k)
  235. }
  236. kvList = append(kvList, kv{
  237. Key: k,
  238. Value: v.UnixNano(),
  239. })
  240. }
  241. // we removed expired ip addresses, if any, above, this could be enough
  242. numToRemove := len(d.banned) - d.config.EntriesSoftLimit
  243. if numToRemove <= 0 {
  244. return
  245. }
  246. sort.Sort(kvList)
  247. for idx, kv := range kvList {
  248. if idx >= numToRemove {
  249. break
  250. }
  251. delete(d.banned, kv.Key)
  252. }
  253. }
  254. }
  255. func (d *memoryDefender) cleanupHosts() {
  256. if len(d.hosts) > d.config.EntriesHardLimit {
  257. kvList := make(kvList, 0, len(d.hosts))
  258. for k, v := range d.hosts {
  259. value := int64(0)
  260. if len(v.Events) > 0 {
  261. value = v.Events[len(v.Events)-1].dateTime.UnixNano()
  262. }
  263. kvList = append(kvList, kv{
  264. Key: k,
  265. Value: value,
  266. })
  267. }
  268. sort.Sort(kvList)
  269. numToRemove := len(d.hosts) - d.config.EntriesSoftLimit
  270. for idx, kv := range kvList {
  271. if idx >= numToRemove {
  272. break
  273. }
  274. delete(d.hosts, kv.Key)
  275. }
  276. }
  277. }
  278. type kv struct {
  279. Key string
  280. Value int64
  281. }
  282. type kvList []kv
  283. func (p kvList) Len() int { return len(p) }
  284. func (p kvList) Less(i, j int) bool { return p[i].Value < p[j].Value }
  285. func (p kvList) Swap(i, j int) { p[i], p[j] = p[j], p[i] }