defendermem.go 8.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354
  1. // Copyright (C) 2019 Nicola Murino
  2. //
  3. // This program is free software: you can redistribute it and/or modify
  4. // it under the terms of the GNU Affero General Public License as published
  5. // by the Free Software Foundation, version 3.
  6. //
  7. // This program is distributed in the hope that it will be useful,
  8. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. // GNU Affero General Public License for more details.
  11. //
  12. // You should have received a copy of the GNU Affero General Public License
  13. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  14. package common
  15. import (
  16. "sort"
  17. "sync"
  18. "time"
  19. "github.com/drakkan/sftpgo/v2/internal/dataprovider"
  20. "github.com/drakkan/sftpgo/v2/internal/util"
  21. )
  22. type memoryDefender struct {
  23. baseDefender
  24. sync.RWMutex
  25. // IP addresses of the clients trying to connected are stored inside hosts,
  26. // they are added to banned once the thresold is reached.
  27. // A violation from a banned host will increase the ban time
  28. // based on the configured BanTimeIncrement
  29. hosts map[string]hostScore // the key is the host IP
  30. banned map[string]time.Time // the key is the host IP
  31. }
  32. func newInMemoryDefender(config *DefenderConfig) (Defender, error) {
  33. err := config.validate()
  34. if err != nil {
  35. return nil, err
  36. }
  37. ipList, err := dataprovider.NewIPList(dataprovider.IPListTypeDefender)
  38. if err != nil {
  39. return nil, err
  40. }
  41. defender := &memoryDefender{
  42. baseDefender: baseDefender{
  43. config: config,
  44. ipList: ipList,
  45. },
  46. hosts: make(map[string]hostScore),
  47. banned: make(map[string]time.Time),
  48. }
  49. return defender, nil
  50. }
  51. // GetHosts returns hosts that are banned or for which some violations have been detected
  52. func (d *memoryDefender) GetHosts() ([]dataprovider.DefenderEntry, error) {
  53. d.RLock()
  54. defer d.RUnlock()
  55. var result []dataprovider.DefenderEntry
  56. for k, v := range d.banned {
  57. if v.After(time.Now()) {
  58. result = append(result, dataprovider.DefenderEntry{
  59. IP: k,
  60. BanTime: v,
  61. })
  62. }
  63. }
  64. for k, v := range d.hosts {
  65. score := 0
  66. for _, event := range v.Events {
  67. if event.dateTime.Add(time.Duration(d.config.ObservationTime) * time.Minute).After(time.Now()) {
  68. score += event.score
  69. }
  70. }
  71. if score > 0 {
  72. result = append(result, dataprovider.DefenderEntry{
  73. IP: k,
  74. Score: score,
  75. })
  76. }
  77. }
  78. return result, nil
  79. }
  80. // GetHost returns a defender host by ip, if any
  81. func (d *memoryDefender) GetHost(ip string) (dataprovider.DefenderEntry, error) {
  82. d.RLock()
  83. defer d.RUnlock()
  84. if banTime, ok := d.banned[ip]; ok {
  85. if banTime.After(time.Now()) {
  86. return dataprovider.DefenderEntry{
  87. IP: ip,
  88. BanTime: banTime,
  89. }, nil
  90. }
  91. }
  92. if hs, ok := d.hosts[ip]; ok {
  93. score := 0
  94. for _, event := range hs.Events {
  95. if event.dateTime.Add(time.Duration(d.config.ObservationTime) * time.Minute).After(time.Now()) {
  96. score += event.score
  97. }
  98. }
  99. if score > 0 {
  100. return dataprovider.DefenderEntry{
  101. IP: ip,
  102. Score: score,
  103. }, nil
  104. }
  105. }
  106. return dataprovider.DefenderEntry{}, util.NewRecordNotFoundError("host not found")
  107. }
  108. // IsBanned returns true if the specified IP is banned
  109. // and increase ban time if the IP is found.
  110. // This method must be called as soon as the client connects
  111. func (d *memoryDefender) IsBanned(ip, protocol string) bool {
  112. d.RLock()
  113. if banTime, ok := d.banned[ip]; ok {
  114. if banTime.After(time.Now()) {
  115. increment := d.config.BanTime * d.config.BanTimeIncrement / 100
  116. if increment == 0 {
  117. increment++
  118. }
  119. d.RUnlock()
  120. // we can save an earlier ban time if there are contemporary updates
  121. // but this should not make much difference. I prefer to hold a read lock
  122. // until possible for performance reasons, this method is called each
  123. // time a new client connects and it must be as fast as possible
  124. d.Lock()
  125. d.banned[ip] = banTime.Add(time.Duration(increment) * time.Minute)
  126. d.Unlock()
  127. return true
  128. }
  129. }
  130. defer d.RUnlock()
  131. return d.baseDefender.isBanned(ip, protocol)
  132. }
  133. // DeleteHost removes the specified IP from the defender lists
  134. func (d *memoryDefender) DeleteHost(ip string) bool {
  135. d.Lock()
  136. defer d.Unlock()
  137. if _, ok := d.banned[ip]; ok {
  138. delete(d.banned, ip)
  139. return true
  140. }
  141. if _, ok := d.hosts[ip]; ok {
  142. delete(d.hosts, ip)
  143. return true
  144. }
  145. return false
  146. }
  147. // AddEvent adds an event for the given IP.
  148. // This method must be called for clients not yet banned.
  149. // Returns true if the IP is in the defender's safe list.
  150. func (d *memoryDefender) AddEvent(ip, protocol string, event HostEvent) bool {
  151. if d.IsSafe(ip, protocol) {
  152. return true
  153. }
  154. d.Lock()
  155. defer d.Unlock()
  156. // ignore events for already banned hosts
  157. if v, ok := d.banned[ip]; ok {
  158. if v.After(time.Now()) {
  159. return false
  160. }
  161. delete(d.banned, ip)
  162. }
  163. score := d.baseDefender.getScore(event)
  164. ev := hostEvent{
  165. dateTime: time.Now(),
  166. score: score,
  167. }
  168. if hs, ok := d.hosts[ip]; ok {
  169. hs.Events = append(hs.Events, ev)
  170. hs.TotalScore = 0
  171. idx := 0
  172. for _, event := range hs.Events {
  173. if event.dateTime.Add(time.Duration(d.config.ObservationTime) * time.Minute).After(time.Now()) {
  174. hs.Events[idx] = event
  175. hs.TotalScore += event.score
  176. idx++
  177. }
  178. }
  179. d.baseDefender.logEvent(ip, protocol, event, hs.TotalScore)
  180. hs.Events = hs.Events[:idx]
  181. if hs.TotalScore >= d.config.Threshold {
  182. d.baseDefender.logBan(ip, protocol)
  183. d.banned[ip] = time.Now().Add(time.Duration(d.config.BanTime) * time.Minute)
  184. delete(d.hosts, ip)
  185. d.cleanupBanned()
  186. eventManager.handleIPBlockedEvent(EventParams{
  187. Event: ipBlockedEventName,
  188. IP: ip,
  189. Timestamp: time.Now().UnixNano(),
  190. Status: 1,
  191. })
  192. } else {
  193. d.hosts[ip] = hs
  194. }
  195. } else {
  196. d.baseDefender.logEvent(ip, protocol, event, ev.score)
  197. d.hosts[ip] = hostScore{
  198. TotalScore: ev.score,
  199. Events: []hostEvent{ev},
  200. }
  201. d.cleanupHosts()
  202. }
  203. return false
  204. }
  205. func (d *memoryDefender) countBanned() int {
  206. d.RLock()
  207. defer d.RUnlock()
  208. return len(d.banned)
  209. }
  210. func (d *memoryDefender) countHosts() int {
  211. d.RLock()
  212. defer d.RUnlock()
  213. return len(d.hosts)
  214. }
  215. // GetBanTime returns the ban time for the given IP or nil if the IP is not banned
  216. func (d *memoryDefender) GetBanTime(ip string) (*time.Time, error) {
  217. d.RLock()
  218. defer d.RUnlock()
  219. if banTime, ok := d.banned[ip]; ok {
  220. return &banTime, nil
  221. }
  222. return nil, nil
  223. }
  224. // GetScore returns the score for the given IP
  225. func (d *memoryDefender) GetScore(ip string) (int, error) {
  226. d.RLock()
  227. defer d.RUnlock()
  228. score := 0
  229. if hs, ok := d.hosts[ip]; ok {
  230. for _, event := range hs.Events {
  231. if event.dateTime.Add(time.Duration(d.config.ObservationTime) * time.Minute).After(time.Now()) {
  232. score += event.score
  233. }
  234. }
  235. }
  236. return score, nil
  237. }
  238. func (d *memoryDefender) cleanupBanned() {
  239. if len(d.banned) > d.config.EntriesHardLimit {
  240. kvList := make(kvList, 0, len(d.banned))
  241. for k, v := range d.banned {
  242. if v.Before(time.Now()) {
  243. delete(d.banned, k)
  244. }
  245. kvList = append(kvList, kv{
  246. Key: k,
  247. Value: v.UnixNano(),
  248. })
  249. }
  250. // we removed expired ip addresses, if any, above, this could be enough
  251. numToRemove := len(d.banned) - d.config.EntriesSoftLimit
  252. if numToRemove <= 0 {
  253. return
  254. }
  255. sort.Sort(kvList)
  256. for idx, kv := range kvList {
  257. if idx >= numToRemove {
  258. break
  259. }
  260. delete(d.banned, kv.Key)
  261. }
  262. }
  263. }
  264. func (d *memoryDefender) cleanupHosts() {
  265. if len(d.hosts) > d.config.EntriesHardLimit {
  266. kvList := make(kvList, 0, len(d.hosts))
  267. for k, v := range d.hosts {
  268. value := int64(0)
  269. if len(v.Events) > 0 {
  270. value = v.Events[len(v.Events)-1].dateTime.UnixNano()
  271. }
  272. kvList = append(kvList, kv{
  273. Key: k,
  274. Value: value,
  275. })
  276. }
  277. sort.Sort(kvList)
  278. numToRemove := len(d.hosts) - d.config.EntriesSoftLimit
  279. for idx, kv := range kvList {
  280. if idx >= numToRemove {
  281. break
  282. }
  283. delete(d.hosts, kv.Key)
  284. }
  285. }
  286. }
  287. type kv struct {
  288. Key string
  289. Value int64
  290. }
  291. type kvList []kv
  292. func (p kvList) Len() int { return len(p) }
  293. func (p kvList) Less(i, j int) bool { return p[i].Value < p[j].Value }
  294. func (p kvList) Swap(i, j int) { p[i], p[j] = p[j], p[i] }