$v) { $headers .= bb2_db_escape("$h: $v\n"); } $request_entity = ""; if (!strcasecmp($request_method, "POST")) { foreach ($package['request_entity'] as $h => $v) { $request_entity .= bb2_db_escape("$h: $v\n"); } } return "INSERT INTO `" . bb2_db_escape($settings['log_table']) . "` (`ip`, `date`, `request_method`, `request_uri`, `server_protocol`, `http_headers`, `user_agent`, `request_entity`, `key`) VALUES ('$ip', '$date', '$request_method', '$request_uri', '$server_protocol', '$headers', '$user_agent', '$request_entity', '$key')"; } // Kill 'em all! function bb2_banned($settings, $package, $key, $previous_key=false) { // Some spambots hit too hard. Slow them down a bit. sleep(2); require_once(BB2_CORE . "/banned.inc.php"); bb2_display_denial($settings, $key, $previous_key); bb2_log_denial($settings, $package, $key, $previous_key); if (is_callable('bb2_banned_callback')) { bb2_banned_callback($settings, $package, $key); } // Penalize the spammers some more require_once(BB2_CORE . "/housekeeping.inc.php"); bb2_housekeeping($settings, $package); die(); } function bb2_approved($settings, $package) { // Dirk wanted this if (is_callable('bb2_approved_callback')) { bb2_approved_callback($settings, $package); } // Decide what to log on approved requests. if ($settings['verbose'] || empty($package['user_agent'])) { bb2_db_query(bb2_insert($settings, $package, "00000000")); } } // Check the results of a particular test; see below for usage // Returns FALSE if test passed (yes this is backwards) function bb2_test($settings, $package, $result) { if ($result !== FALSE) { bb2_banned($settings, $package, $result); return TRUE; } return FALSE; } // Let God sort 'em out! function bb2_start($settings) { // Gather up all the information we need, first of all. $headers = bb2_load_headers(); // Postprocess the headers to mixed-case // FIXME: get the world to stop using PHP as CGI $headers_mixed = array(); foreach ($headers as $h => $v) { $headers_mixed[uc_all($h)] = $v; } // We use these frequently. Keep a copy close at hand. $ip = $_SERVER['REMOTE_ADDR']; $request_method = $_SERVER['REQUEST_METHOD']; $request_uri = $_SERVER['REQUEST_URI']; $server_protocol = $_SERVER['SERVER_PROTOCOL']; $user_agent = $_SERVER['HTTP_USER_AGENT']; // Reconstruct the HTTP entity, if present. $request_entity = array(); if (!strcasecmp($request_method, "POST") || !strcasecmp($request_method, "PUT")) { foreach ($_POST as $h => $v) { $request_entity[$h] = $v; } } $package = array('ip' => $ip, 'headers' => $headers, 'headers_mixed' => $headers_mixed, 'request_method' => $request_method, 'request_uri' => $request_uri, 'server_protocol' => $server_protocol, 'request_entity' => $request_entity, 'user_agent' => $user_agent, 'is_browser' => false); // Please proceed to the security checkpoint and have your // identification and boarding pass ready. // First check the whitelist require_once(BB2_CORE . "/whitelist.inc.php"); if (!bb2_whitelist($package)) { // Now check the blacklist require_once(BB2_CORE . "/blacklist.inc.php"); bb2_test($settings, $package, bb2_blacklist($package)); // Check for common stuff require_once(BB2_CORE . "/common_tests.inc.php"); bb2_test($settings, $package, bb2_protocol($settings, $package)); bb2_test($settings, $package, bb2_misc_headers($settings, $package)); // Specific checks $ua = $headers_mixed['User-Agent']; // MSIE checks if (stripos($ua, "MSIE") !== FALSE) { $package['is_browser'] = true; if (stripos($ua, "Opera") !== FALSE) { require_once(BB2_CORE . "/opera.inc.php"); bb2_test($settings, $package, bb2_opera($package)); } else { require_once(BB2_CORE . "/msie.inc.php"); bb2_test($settings, $package, bb2_msie($package)); } } elseif (stripos($ua, "Konqueror") !== FALSE) { $package['is_browser'] = true; require_once(BB2_CORE . "/konqueror.inc.php"); bb2_test($settings, $package, bb2_konqueror($package)); } elseif (stripos($ua, "Opera") !== FALSE) { $package['is_browser'] = true; require_once(BB2_CORE . "/opera.inc.php"); bb2_test($settings, $package, bb2_opera($package)); } elseif (stripos($ua, "Safari") !== FALSE) { $package['is_browser'] = true; require_once(BB2_CORE . "/safari.inc.php"); bb2_test($settings, $package, bb2_safari($package)); } elseif (stripos($ua, "Lynx") !== FALSE) { $package['is_browser'] = true; require_once(BB2_CORE . "/lynx.inc.php"); bb2_test($settings, $package, bb2_lynx($package)); } elseif (stripos($ua, "MovableType") !== FALSE) { require_once(BB2_CORE . "/movabletype.inc.php"); bb2_test($settings, $package, bb2_movabletype($package)); } elseif (stripos($ua, "msnbot") !== FALSE || stripos($ua, "MS Search") !== FALSE) { require_once(BB2_CORE . "/msnbot.inc.php"); bb2_test($settings, $package, bb2_msnbot($package)); } elseif (stripos($ua, "Googlebot") !== FALSE || stripos($ua, "Mediapartners-Google") !== FALSE) { require_once(BB2_CORE . "/google.inc.php"); bb2_test($settings, $package, bb2_google($package)); } elseif (stripos($ua, "Mozilla") !== FALSE && stripos($ua, "Mozilla" == 0)) { $package['is_browser'] = true; require_once(BB2_CORE . "/mozilla.inc.php"); bb2_test($settings, $package, bb2_mozilla($package)); } // More intensive screening applies to POST requests if (!strcasecmp('POST', $package['request_method'])) { require_once(BB2_CORE . "/post.inc.php"); bb2_test($settings, $package, bb2_post($settings, $package)); } } // Last chance screening. require_once(BB2_CORE . "/screener.inc.php"); bb2_screener($settings, $package); // And that's about it. bb2_approved($settings, $package); return true; } ?>