'fieldset', '#title' => 'IP Address Banning' ); $form['ip_settings']['troll_enable_ip_ban'] = array( '#type' => 'radios', '#title' => t('IP Address Banning'), '#default_value' => variable_get('troll_enable_ip_ban', 1), '#options' => array('1' => t('Enable banning by IP address'), '0' => t('Disable banning by IP address')) ); $form['ip_settings']['troll_ip_ban_redirect'] = array( '#type' => 'textfield', '#title' => t('IP Ban Relocation Page'), '#default_value' => variable_get('troll_ip_ban_redirect', ''), '#description' => t("Page for relocating users banned based on their IP address or domain name. If left blank, users will be redirected to blocked.html in the troll module's directory. Do not use a drupal path here! You will cause a loop since IP banning completely blocks all access to the site! Edit the blocked.html file, or redirect to http://localhost."), ); $roles = user_roles(); array_unshift($roles, t(' -Select Role- ')); $form['role_settings'] = array( '#type' => 'fieldset', '#title' => t('User Blocking') ); $form['role_settings']['troll_block_role'] = array( '#type' => 'select', '#title' => t('Troll Block Role'), '#default_value' => variable_get('troll_block_role', 0), '#options' => $roles, '#description' => t('Select the role to assign to users when blocking from the troll administration screens.'), ); return system_settings_form($form); } /** * Admin settings page validate handler. * * @see troll_admin_settings() */ function troll_admin_settings_validate($form, &$form_state) { if ($form_state['values']['troll_block_role'] == '0') { form_set_error('troll_block_role', t('You must choose a role to assign to users when blocking from the troll settings page.')); } } /** * Menu callback: user IP banning. */ function troll_ip_ban() { $form['banfieldset'] = array( '#type' => 'fieldset', '#title' => t('Add IP Ban'), '#weight' => -1, '#collapsible' => TRUE, '#collapsed' => FALSE ); $form['banfieldset']['banform'] = troll_ip_ban_form(array()); $form['ipdisplay'] = array( '#type' => 'fieldset', '#title' => t('Banned IPs'), '#value' => troll_display_ip(), '#weight' => 0, '#collapsible' => TRUE, '#collapsed' => FALSE ); $form['#validate'] = array('troll_ip_ban_form_validate'); return $form; } /** * Submit handler for IP Ban form. * * @see troll_ip_ban() * @see troll_ip_ban_form() */ function troll_ip_ban_submit($form, &$form_state) { troll_insert_ip($form_state['values']); } /** * Summary of how many IP blocks are filtered. * * @return string */ function troll_blacklist_summary() { $count = db_query('SELECT COUNT(net) FROM {troll_blacklist}')->fetchField(); return t('%d address blocks filtered.', array('%d' => $count)); } /** * Gives admins a choice of how to punish blacklisted visitors * * @return array */ function troll_blacklist_punishment_form() { $form['stutter'] = array( '#type' => 'checkbox', '#title' => t('Randomly stutter output'), '#default_value' => variable_get('troll_blacklist_stutter', 0), '#description' => t('While outputting content, the troll module will cause Drupal to "sleep" for random intervals of 1-5 seconds to delay output.') ); $form['mod_requests'] = array( '#type' => 'radios', '#title' => t('Page request modification'), '#options' => array(t('none'), 'silent_post_drop' => 'Silently drop form post submission data', 'notice_post_drop' => 'Drop form post submission data and give a notice'), '#default_value' => variable_get('troll_blacklist_mod_requests', '0'), '#description' => t('Modifies data sent by visitors from blacklisted IPs before Drupal even has a chance to process it.') ); $form['alt_page_output'] = array( '#type' => 'fieldset', '#title' => 'Alternate page output' ); $form['alt_page_output']['alt_page'] = array( '#type' => 'radios', '#title' => 'Alternate pages', '#options' => array(t('none'), 'blank' => t('Blank pages'), '404' => t('404 every page request'), 'redirect' => t('Redirect to alternate URL')), '#default_value' => variable_get('troll_blacklist_alt_page', '0'), '#description' => t('Sends alternate page output, whether the visitor hits a real URL or not.') ); $form['alt_page_output']['alt_url'] = array( '#type' => 'textfield', '#title' => t('Redirection URL'), '#default_value' => variable_get('troll_blacklist_alt_url', ''), '#description' => t('URL to redirect blacklisted visitors to if "Redirect to alternate URL" is selected. Start with the appropriate prefix (e.g. http://)') ); $form['submit'] = array( '#type' => 'submit', '#value' => t('Update Blacklist Punishments'), '#weight' => 1 ); return $form; } /** * Submit handler for punishment form. * * @see troll_blacklist_punishment() */ function troll_blacklist_punishment_form_submit($form, $form_state) { variable_set('troll_blacklist_mod_requests', $form_state['values']['mod_requests']); variable_set('troll_blacklist_stutter', $form_state['values']['stutter']); variable_set('troll_blacklist_alt_page', $form_state['values']['alt_page']); variable_set('troll_blacklist_alt_url', $form_state['values']['alt_url']); drupal_set_message(t('The settings have been updated.')); } /** * Builds form array for admin to select how to import a new blacklist. * * @return array */ function troll_blacklist_import_form() { $form['truncate_list'] = array( '#type' => 'checkbox', '#title' => t('Truncate/delete existing blacklist before import') ); $options = array(); $options[0] = ''; if (function_exists('gzopen')) { $options['OCgz'] = 'OpenBSD mirror: okean.com China bzip archive'; $options['OKgz'] = 'OpenBSD mirror: okean.com Korea bzip archive'; } $options['OTtx'] = 'okean.com China and Korea text file'; $options['OCtx'] = 'okean.com China text file'; $options['OKtx'] = 'okean.com Korea text file'; $form['select_list'] = array( '#type' => 'select', '#title' => t('Download and import'), '#options' => $options, '#description' => t('Downloads supported blacklist from the internet. Please select a mirror when possible.'), ); $form['custom_list'] = array( '#type' => 'textfield', '#title' => t('List URL'), '#description' => t('URL of a list to import. List files should have one address per line in Classless Internet Domain Routing CIDR format (x.x.x.x/x). Individual IPs should still have /32.'), ); $form['submit'] = array( '#type' => 'submit', '#value' => t('Import List'), '#weight' => 1, ); return $form; } /** * Submit handler for blacklist import. * * @see troll_blacklist_import() */ function troll_blacklist_import_form_submit($form, &$form_state) { if (!empty($form_state['values']['truncate_list'])) { if (db_query('TRUNCATE TABLE {troll_blacklist}')) { drupal_set_message(t('Blacklist table truncated.')); } } if (!empty($form_state['values']['select_list'])) { troll_blacklist_import_list($form_state['values']['select_list']); } if (!empty($form_state['values']['custom_list'])) { troll_blacklist_import_url($form_state['values']['custom_list']); } $form_state['redirect'] = 'admin/user/troll/ip_blacklist'; } /** * Decyphers what dropdown selection was chosen to send for parsing out IP blocks * * @see troll_blacklist_import_form() * @see troll_blacklist_parse_save() * @param array $edit */ function troll_blacklist_import_list($list) { $files = array( 'OCgz' => array('gz' => 'http://www.openbsd.org/spamd/chinacidr.txt.gz'), 'OKgz' => array('gz' => 'http://www.openbsd.org/spamd/koreacidr.txt.gz'), 'OTtx' => array('txt' => 'http://www.okean.com/sinokoreacidr.txt'), 'OCtx' => array('txt' => 'http://www.okean.com/chinacidr.txt'), 'OKtx' => array('txt' => 'http://www.okean.com/koreacidr.txt')); if (!isset($files[$list])) { drupal_set_message(t('Form input not valid')); return FALSE; } $file_type = array_keys($files[$list]); troll_blacklist_parse_save($files[$list][$file_type[0]], $file_type[0]); } /** * Parses a URL to send for parsing out IP blocks * * @see troll_blacklist_parse_save() * @param array $edit */ function troll_blacklist_import_url($edit) { $url_parts = parse_url($edit['custom_list']); $file_parts = pathinfo($url_parts['path']); troll_blacklist_parse_save($edit['custom_list'], $file_parts['extension']); } /** * Parses input file, line by line, searching for IP blocks in CIDR * format (x.x.x.x/x). Understands files in text, bzip, and bzip2 format, * where the PHP installation supports it. Writes what it finds to the * database as long integers. * * @todo should probably function_exists() the compression file functions * @param $file_name string * @param $file_type string */ function troll_blacklist_parse_save($file_name, $file_type) { $netmasks = array( 0, -2147483648, -1073741824, -536870912, -268435456, -134217728, -67108864, -33554432, -16777216, -8388608, -4194304, -2097152, -1048576, -524288, -262144, -131072, -65536, -32768, -16384, -8192, -4096, -2048, -1024, -512, -256, -128, -64, -32, -16, -8, -4, -2, -1); switch ($file_type) { case 'gz': $fp = gzopen($file_name, 'r'); break; default: $fp = fopen($file_name, 'r'); break; } if (is_resource($fp)) { $i = 0; while (!feof($fp)) { $buffer = fgets($fp); if ($buffer{0} != '#' && ($buffer{0} != '/' && $buffer{1} != '/') && !empty($buffer)) { preg_match("/([0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3})\/([0-9]{1,2})/", $buffer, $matches); // $matches array // 0 = whole string // 1 = i.i.i.i // 2 = s $longip = ip2long($matches[1]); unset($buffer, $matches[0], $matches[1]); if ($matches[2] == 32) { $net = $bcast = $longip; } else { $net = $longip & $netmasks[$matches[2]]; $bcast = $longip | ($netmasks[$matches[2]] ^ -1); } db_delete('troll_blacklist') ->condition(db_and()->condition('net', $net)->condition('bcast', $bcast)) ->execute(); db_insert('troll_blacklist') ->fields(array( 'net' => $net, 'bcast' => $bcast )) ->execute(); $i++; } } switch ($file_type) { case 'gz': gzclose($fp); break; default: fclose($fp); break; } drupal_set_message(t('%i IP blocks imported', array('%i' => $i))); } else { drupal_set_message(t('Import failed! File could not be read.')); } } /** * Form to search blacklist to see if an IP matches * * @return array */ function troll_blacklist_search_form($form_state) { $form['ip_address'] = array( '#type' => 'textfield', '#title' => t('IP Address'), '#size' => 15, '#maxlength' => 15, '#description' => t('Address to search for in the database of imported IP blocks.'), ); $form['submit'] = array( '#type' => 'submit', '#value' => t('Search Blacklisted IPs'), '#weight' => 1 ); $form['result'] = array( '#type' => 'fieldset', '#title' => t('Blacklisted IPs'), '#value' => !empty($form_state['values']['ip_address']) ? troll_blacklist_search($form_state['values']['ip_address']) : troll_blacklist_search(''), '#weight' => 2, '#collapsible' => TRUE, '#collapsed' => FALSE ); return $form; } /** * Submit handler for blacklist search form. * * @see troll_blacklist_search_blacklist_form() */ function troll_blacklist_search_form_submit($form, &$form_state) { $form_state['rebuild'] = TRUE; } /** * Perform search to see if an IP address matches a blacklisted IP block. * * @return string */ function troll_blacklist_search($ip_address) { $headers = array( array('data' => t('Network Address'), 'field' => 'net', 'sort' => 'asc'), array('data' => t('Broadcast Address'), 'field' => 'bcast'), array('data' => t('Actions'), 'field' => 'delete') ); if ($ip_address == '') { $result = pager_query('SELECT net, bcast FROM {troll_blacklist}', 25, 0, 'SELECT COUNT(*) FROM {troll_blacklist}'); } else { $sql = 'SELECT net, bcast FROM {troll_blacklist} WHERE net <= :longip AND bcast >= :longip'; $count_sql = 'SELECT COUNT(*) FROM {troll_blacklist} WHERE net <= :longip AND bcast >= :longip'; $longip = _troll_longip($ip_address); $sql .= tablesort_sql($headers); $result = pager_query($sql, 25, 0, $count_sql, array(':longip' => $longip)); } while ($row = $result->fetchObject()) { $printnet = long2ip($row->net); $printbcast = long2ip($row->bcast); $action = l(t('remove'), "admin/user/troll/ip_blacklist/deleteblack/{$row->net}/{$row->bcast}"); $rows[] = array($printnet, $printbcast, $action); } if (!empty($rows)) { $pager = theme('pager', NULL, 25, 0); if (!empty($pager)) { $rows[] = array(array('data' => $pager, 'colspan' => 3)); } return theme('table', $headers, $rows); } else { drupal_set_message(t('No matches found.')); return FALSE; } } /** * Form builder function * * @param $net string Not used, here for later implementation of whitelist editing * @param $bcast string Not used, here for later implementation of whitelist editing * @see troll_whitelist_form() * @return string */ function troll_whitelist($net = NULL, $bcast = NULL) { $sql = 'SELECT net, bcast FROM {troll_whitelist}'; $count_sql = 'SELECT COUNT(*) FROM {troll_whitelist}'; $headers = array( array('data' => t('Start/Network Address'), 'field' => 'net', 'sort' => 'asc'), array('data' => t('End/Broadcast Address'), 'field' => 'bcast'), array('data' => t('Actions'), 'field' => 'delete') ); $sql .= tablesort_sql($headers); $result = pager_query($sql, 25, 0, $count_sql); while ($row = db_fetch_object($result)) { $printnet = long2ip($row->net); $printbcast = long2ip($row->bcast); $action = l(t('remove'), "admin/user/troll/ip_blacklist/deletewhite/{$row->net}/{$row->bcast}"); $rows[] = array($printnet, $printbcast, $action); } $pager = theme('pager', NULL, 25, 0); if (!empty($pager)) { $rows[] = array(array('data' => $pager, 'colspan' => 3)); } return theme('table', $headers, $rows); } /** * Display form for creating new whitelist block and table of current whitelisted IPs. * * @todo make this also useful for editing existing whitelist entries * @return array */ function troll_whitelist_form($form_state) { $form['whitelist_addr1'] = array( '#type' => 'textfield', '#title' => t('Starting IP Address'), '#size' => 15, '#maxlength' => 15, '#default_value' => isset($net) ? long2ip($net) : '', '#description' => t('IP or start to range of IPs to whitelist.'), '#required' => TRUE ); $form['whitelist_addr2'] = array( '#type' => 'textfield', '#title' => t('Ending IP Address'), '#size' => 15, '#maxlength' => 15, '#default_value' => isset($bcast) ? long2ip($bcast) : '', '#description' => t('End of IP range to whitelist. If whitelisting a single IP, leave this blank.'), '#required' => false ); $form['submit'] = array( '#type' => 'submit', '#value' => t('Insert Whitelist IPs'), '#weight' => 1 ); $form['whitelist'] = array( '#type' => 'fieldset', '#title' => t('Whitelisted IPs'), '#value' => troll_whitelist(), '#weight' => 2, '#collapsible' => TRUE, '#collapsed' => FALSE ); return $form; } /** * Insert a new IP block into the whitelist * * @param array $edit */ function troll_whitelist_form_submit($form, &$form_state) { $whitelist_addr1 = $form_state['values']['whitelist_addr1']; $whitelist_addr2 = $form_state['values']['whitelist_addr2']; $longip1 = _troll_longip($whitelist_addr1); $longip2 = _troll_longip(empty($whitelist_addr2) ? $whitelist_addr1 : $whitelist_addr2); if ($longip1 > $longip2) { $temp = $longip1; $longip1 = $longip2; $longip2 = $temp; unset($temp); } db_delete('troll_whitelist') ->condition(db_and()->condition('net', $longip1)->condition('bcast', $longip2)) ->execute(); db_insert('troll_whitelist') ->fields(array( 'net' => $longip1, 'bcast' => $longip2 )) ->execute(); drupal_set_message(t('IP range %ip1 to %ip2 whitelisted.', array('%ip1' => long2ip($longip1), '%ip2' => long2ip($longip2)))); } /** * Menu callback: block a user and redirect to search page. * * @param $uid */ function troll_confirm_block_user_form($form_state, $uid) { $account = user_load($uid); if (!$account) { drupal_goto('admin/user/troll'); } $form['uid'] = array( '#type' => 'value', '#value' => $uid, ); return confirm_form($form, t('Block user %username?', array('%username' => $account->name)), 'admin/user/troll', t('Are you sure you want to block this user?')); } function troll_confirm_block_user_form_submit($form, &$form_state) { troll_block_user($form_state['values']['uid']); $form_state['redirect'] = 'admin/user/troll'; } /** * IP banning form. * * @param $iid int * @return array */ function troll_ip_ban_form($form_state, $iid = NULL) { $form['submit'] = array( '#type' => 'submit', '#value' => (isset($iid)) ? t('Update Banned IP') : t('Ban IP'), '#weight' => 1, ); $ip = db_query_range('SELECT * FROM {troll_ip_ban} WHERE iid = :iid', array(':iid' => $iid), 0, 1)->fetchObject(); $form['iid'] = array( '#type' => 'value', '#value' => !empty($ip->iid) ? $ip->iid : '', ); $form['ip_address'] = array( '#type' => 'textfield', '#title' => t('IP Address'), '#default_value' => !empty($ip->ip_address) ? $ip->ip_address : '', '#description' => t('The IP address to ban.'), '#required' => TRUE ); $form['domain_name'] = array( '#type' => 'textfield', '#title' => t('Domain Name'), '#default_value' => !empty($ip->domain_name) ? $ip->domain_name : (!empty($ip->ip_address) ? gethostbyaddr($ip->ip_address) : ''), '#description' => t('The Domain Name of the IP address to ban - for reference only.') ); troll_ip_ban_expire_form($form, $ip); return $form; } /** * troll_ip_ban form validate callback function. * * @see troll_ip_ban_form() */ function troll_ip_ban_form_validate($form, &$form_state) { if (!preg_match('([0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3})', $form_state['values']['ip_address'])) { form_set_error('ip_address', t('Please include a valid IP address.')); } } /** * Submit handler for IP ban form. * * @see troll_ip_ban_form() */ function troll_ip_ban_form_submit($form, &$form_state) { troll_update_ip($form_state['values']); $form_state['redirect'] = 'admin/user/troll/ip_ban'; } /** * Helper function to return the expire form elements. */ function troll_ip_ban_expire_form(&$form, $ip) { $timestamp = isset($ip->expires) ? $ip->expires : REQUEST_TIME; $date = getdate(gmmktime()); $curyear = $date['year']; $i = 0; while ($i < 10) { $years[$curyear + $i] = $curyear + $i; $i++; } $months = array(1 => t('January'), t('February'), t('March'), t('April'), t('May'), t('June'), t('July'), t('August'), t('September'), t('October'), t('November'), t('December')); for ($i = 1; $i <= 31; $i++) { $days[$i] = $i; } $form['timestamp'] = array( '#type' => 'fieldset', '#title' => t('Expires'), '#prefix' => '