198 lines
		
	
	
		
			5.8 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			198 lines
		
	
	
		
			5.8 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
| <?php
 | |
| 
 | |
| namespace Zotlabs\Web;
 | |
| 
 | |
| /**
 | |
|  *
 | |
|  * @brief This file includes session related functions.
 | |
|  *
 | |
|  * Session management functions. These provide database storage of PHP
 | |
|  * session info.
 | |
|  */
 | |
| 
 | |
| 
 | |
| class Session {
 | |
| 
 | |
| 	private $handler = null;
 | |
| 	private $session_started = false;
 | |
| 	private $custom_handler = false;
 | |
| 	public function init() {
 | |
| 
 | |
| 		$gc_probability = 50;
 | |
| 
 | |
| 		ini_set('session.gc_probability', $gc_probability);
 | |
| 		ini_set('session.use_only_cookies', 1);
 | |
| 		ini_set('session.cookie_httponly', 1);
 | |
| 
 | |
| 		$this->custom_handler = boolval(get_config('system', 'session_custom', false));
 | |
| 				
 | |
| 		/*
 | |
| 		 * Set our session storage functions.
 | |
| 		 */
 | |
| 		
 | |
| 		if($this->custom_handler) {
 | |
| 			/* Custom handler (files, memached, redis..) */
 | |
| 
 | |
| 			$session_save_handler = strval(get_config('system', 'session_save_handler', Null));
 | |
| 			$session_save_path = strval(get_config('system', 'session_save_path', Null));
 | |
| 			$session_gc_probability = intval(get_config('system', 'session_gc_probability', 1));
 | |
| 			$session_gc_divisor = intval(get_config('system', 'session_gc_divisor', 100));
 | |
| 			if(!$session_save_handler || !$session_save_path) {
 | |
| 				logger('Session save handler or path not set.',LOGGER_NORMAL,LOG_ERR);
 | |
| 			}
 | |
| 			else {
 | |
| 				ini_set('session.save_handler', $session_save_handler);
 | |
| 				ini_set('session.save_path', $session_save_path);
 | |
| 				ini_set('session.gc_probability', $session_gc_probability);
 | |
| 				ini_set('session.gc_divisor', $session_gc_divisor);
 | |
| 			}
 | |
| 		}
 | |
| 		else {
 | |
| 			$handler = new \Zotlabs\Web\SessionHandler();
 | |
| 
 | |
| 			$this->handler = $handler;
 | |
| 
 | |
| 		   	$x = session_set_save_handler($handler,false);
 | |
| 		   	if(! $x)
 | |
| 		   		logger('Session save handler initialisation failed.',LOGGER_NORMAL,LOG_ERR);
 | |
| 		}
 | |
| 
 | |
| 		// Force cookies to be secure (https only) if this site is SSL enabled. 
 | |
| 		// Must be done before session_start().
 | |
| 
 | |
| 
 | |
| 		$arr = session_get_cookie_params();
 | |
| 		
 | |
| 		// Note when setting cookies: set the domain to false which creates a single domain
 | |
| 		// cookie. If you use a hostname it will create a .domain.com wildcard which will
 | |
| 		// have some nasty side effects if you have any other subdomains running hubzilla. 
 | |
| 
 | |
| 		session_set_cookie_params(
 | |
| 			((isset($arr['lifetime']))   ? $arr['lifetime'] : 0),
 | |
| 			((isset($arr['path']))      ? $arr['path']     : '/'),
 | |
| 			(($arr['domain'])    ? $arr['domain']   : false),
 | |
| 			((isset($_SERVER['HTTPS']) && strtolower($_SERVER['HTTPS']) == 'on') ? true : false),
 | |
| 			((isset($arr['httponly']))  ? $arr['httponly'] : true)
 | |
| 		);
 | |
| 
 | |
| 		register_shutdown_function('session_write_close');
 | |
| 
 | |
| 	}
 | |
| 
 | |
| 	public function start() {
 | |
| 		session_start();
 | |
| 		$this->session_started = true;
 | |
| 	}
 | |
| 
 | |
| 	/**
 | |
| 	 * @brief Resets the current session.
 | |
| 	 *
 | |
| 	 * @return void
 | |
| 	 */
 | |
| 
 | |
| 	public function nuke() {
 | |
| 		$this->new_cookie(0); // 0 means delete on browser exit
 | |
| 		if($_SESSION && count($_SESSION)) {
 | |
| 			foreach($_SESSION as $k => $v) {
 | |
| 				unset($_SESSION[$k]);
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	public function new_cookie($xtime) {
 | |
| 
 | |
| 		$newxtime = (($xtime> 0) ? (time() + $xtime) : 0);
 | |
| 
 | |
| 		$old_sid = session_id();
 | |
| 
 | |
| 		$arr = session_get_cookie_params();
 | |
| 
 | |
| 		if(($this->handler || $this->custom_handler) && $this->session_started) {
 | |
| 
 | |
| 			session_regenerate_id(true);
 | |
| 
 | |
| 			// force SessionHandler record creation with the new session_id
 | |
| 			// which occurs as a side effect of read()
 | |
| 			if (! $this->custom_handler) {
 | |
| 				$this->handler->read(session_id());
 | |
| 			}
 | |
| 		}
 | |
| 		else 
 | |
| 			logger('no session handler');
 | |
| 
 | |
| 		if (x($_COOKIE, 'jsdisabled')) {
 | |
| 			setcookie('jsdisabled', $_COOKIE['jsdisabled'], $newxtime, '/', false,((isset($_SERVER['HTTPS']) && strtolower($_SERVER['HTTPS']) == 'on') ? true : false),((isset($arr['httponly']))  ? $arr['httponly'] : true));
 | |
| 		}
 | |
| 		setcookie(session_name(),session_id(),$newxtime, '/', false,((isset($_SERVER['HTTPS']) && strtolower($_SERVER['HTTPS']) == 'on') ? true : false),((isset($arr['httponly']))  ? $arr['httponly'] : true));
 | |
| 
 | |
| 		$arr = array('expire' => $xtime);
 | |
| 		call_hooks('new_cookie', $arr);
 | |
| 
 | |
| 	}
 | |
| 
 | |
| 	public function extend_cookie() {
 | |
| 
 | |
| 		$arr = session_get_cookie_params();
 | |
| 
 | |
| 		// if there's a long-term cookie, extend it
 | |
| 
 | |
| 		$xtime = (($_SESSION['remember_me']) ? (60 * 60 * 24 * 365) : 0 );
 | |
| 
 | |
| 		if($xtime)
 | |
| 			setcookie(session_name(),session_id(),(time() + $xtime), '/', false,((isset($_SERVER['HTTPS']) && strtolower($_SERVER['HTTPS']) == 'on') ? true : false),((isset($arr['httponly']))  ? $arr['httponly'] : true));
 | |
| 		$arr = array('expire' => $xtime);
 | |
| 		call_hooks('extend_cookie', $arr);
 | |
| 
 | |
| 	}
 | |
| 
 | |
| 
 | |
| 	public function return_check() {
 | |
| 
 | |
| 		// check a returning visitor against IP changes.
 | |
| 		// If the change results in being blocked from re-entry with the current cookie
 | |
| 		// nuke the session and logout.
 | |
| 		// Returning at all indicates the session is still valid.
 | |
| 
 | |
| 		// first check if we're enforcing that sessions can't change IP address
 | |
| 		// @todo what to do with IPv6 addresses
 | |
| 
 | |
| 		if($_SESSION['addr'] && $_SESSION['addr'] != $_SERVER['REMOTE_ADDR']) {
 | |
| 			logger('SECURITY: Session IP address changed: ' . $_SESSION['addr'] . ' != ' . $_SERVER['REMOTE_ADDR']);
 | |
| 
 | |
| 			$partial1 = substr($_SESSION['addr'], 0, strrpos($_SESSION['addr'], '.')); 
 | |
| 			$partial2 = substr($_SERVER['REMOTE_ADDR'], 0, strrpos($_SERVER['REMOTE_ADDR'], '.')); 
 | |
| 
 | |
| 			$paranoia = intval(get_pconfig($_SESSION['uid'], 'system', 'paranoia'));
 | |
| 
 | |
| 			if(! $paranoia)
 | |
| 				$paranoia = intval(get_config('system', 'paranoia'));
 | |
| 
 | |
| 			switch($paranoia) {
 | |
| 				case 0:
 | |
| 					// no IP checking
 | |
| 					break;
 | |
| 				case 2:
 | |
| 					// check 2 octets
 | |
| 					$partial1 = substr($partial1, 0, strrpos($partial1, '.'));
 | |
| 					$partial2 = substr($partial2, 0, strrpos($partial2, '.'));
 | |
| 					if($partial1 == $partial2)
 | |
| 						break;
 | |
| 				case 1:
 | |
| 					// check 3 octets
 | |
| 					if($partial1 == $partial2)
 | |
| 						break;
 | |
| 				case 3:
 | |
| 				default:
 | |
| 					// check any difference at all
 | |
| 					logger('Session address changed. Paranoid setting in effect, blocking session. '
 | |
| 					. $_SESSION['addr'] . ' != ' . $_SERVER['REMOTE_ADDR']);
 | |
| 					$this->nuke();
 | |
| 					goaway(z_root());
 | |
| 					break;
 | |
| 			}
 | |
| 		}
 | |
| 		return true;
 | |
| 	}
 | |
| 
 | |
| }
 |