Mercurial > thymian
diff server/flood_check.cpp @ 0:a4671277546c tip
created the repository for the thymian project
| author | ferencd |
|---|---|
| date | Tue, 17 Aug 2021 11:19:54 +0200 |
| parents | |
| children |
line wrap: on
line diff
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/server/flood_check.cpp Tue Aug 17 11:19:54 2021 +0200 @@ -0,0 +1,161 @@ +#include "flood_check.h" + +#include <config.h> + +#include <stdint.h> +#include <log.h> +#include <sstream> + +std::mutex flood_check::locker; + +std::map<std::time_t, flood_check::flood_map> flood_check::floods; +std::map<std::string, flood_check::count_started> flood_check::hostd_flood; +std::map<std::string, int> flood_check::suspension_times; +std::map<std::string, std::time_t> flood_check::rejected_hosts; + +void flood_check::attempt(std::string ip) +{ + std::lock_guard<std::mutex> guard(locker); + + std::chrono::time_point<std::chrono::system_clock> p2; + p2 = std::chrono::system_clock::now(); + std::time_t c = std::chrono::duration_cast<std::chrono::seconds>(p2.time_since_epoch()).count(); + static std::time_t last_second = 0; + + // see if this host is in the kicked out hosts map and if his sentence is still valid or not + if(rejected_hosts.count(ip) > 0) + { + if(suspension_times.count(ip) > 0) + { + // sentence valid, kick him out + auto timediff = std::difftime(rejected_hosts[ip], c); + if(timediff <= suspension_times[ip] * config::instance().flood.default_suspension_time && timediff >= 0) + { + // debug() << "IP:" << ip << " still rejected for " << timediff << " seconds"; + // debug() << "LEAVE rejected throw"; + + throw std::runtime_error("rejected"); + } + if(timediff < 0) + { + // sentence invalid, host has served ts sentence, however we are suspicious. + if(abs(timediff) < 5) // if he tries again after 5 seconds of the expiration time + { + // kick him out again, with greater penalty + rejected_hosts[ip] = c + ( ++suspension_times[ip] * config::instance().flood.default_suspension_time ); + // debug() << "IP:" << ip << " rejection increased for " << rejected_hosts[ip] - c << " seconds since it tried between " << abs(timediff) << " seconds"; + } + else + { + // debug() << "IP:" << ip << " lifting rejection: timediff=" << abs(timediff); + // let's hope his intentions are honest for now and forgive him by erasing his sin + suspension_times.erase(ip); + hostd_flood.erase(ip); + rejected_hosts.erase(ip); + } + } + else + { + // debug() << "IP:" << ip << " is strangely behaving: " << timediff << " seconds, rejecting regardless"; + throw std::runtime_error("rejected"); + } + } + else + { + // we shouldn't really be here + log_critical() << "IP:" << ip << "has sentence, however no suspension counter"; + suspension_times.erase(ip); + hostd_flood.erase(ip); + rejected_hosts.erase(ip); + } + } + else + { + // debug() << "IP:" << ip << " not in rejected_hosts"; + } + + std::string key = std::to_string(static_cast<uint64_t>(c)) + "_" + ip; + + if(floods.count(c) > 0) + { + flood_map& cfm = floods[c]; + if(cfm.count(key) > 0) + { + auto& flood_value = ++ cfm[key]; + // now check if flood_value > 100 and do something about it + if(flood_value > config::instance().flood.max_offense_per_second) + { + debug() << "IP:" << ip << " tries to flood"; + if(hostd_flood.count(ip) > 0) + { + auto& flood_cnt = ++ hostd_flood[ip].count; + debug() << "IP:" << ip << " tries to flood: " << flood_cnt; + + if(flood_cnt > config::instance().flood.max_accepted_offenses) + { + auto tdiff = std::difftime(c, hostd_flood[ip].first_time); + if(tdiff < config::instance().flood.max_offense_time) + { + // this host has tried to flood our system at least 10 times during the last minute, suspend him + if(suspension_times.count(ip) > 0) + { + rejected_hosts.emplace(ip, c + ( ++suspension_times[ip] * config::instance().flood.default_suspension_time )); + debug() << "IP:" << ip << " rejected for " << rejected_hosts[ip] - c << " seconds"; + } + else + { + debug() << "IP:" << ip << "mandated for rejection since:" << suspension_times.count(ip); + suspension_times.emplace(ip, 0); + } + } + else + { + // first offence happened long time ago, time to set it up again, don't reset count since we don't like flooding us + hostd_flood[ip].first_time = c; + debug() << "IP:" << ip << " tries to flood but too long time has passed:" << tdiff; + } + } + else + { + debug() << "IP:" << ip << " tries to flood but hasn't got enough flood_cnt: " << flood_cnt; + } + } + else + { + hostd_flood.emplace(ip, count_started()); + } + debug() << "LEAVE flood throw"; + throw std::runtime_error("flood"); + } + } + else + { + cfm[key] = 1; + } + } + else + { + // create a new entry + flood_map fm; + fm[key] = 1; + floods.emplace(c, fm); + } + + // just debug: + for(const auto& k : rejected_hosts) + { + std::stringstream ss; + ss << "rejected IP:" << k.first << " time:" << k.second - c; + // debug() << ss.str(); + } + + // now remove the previous seconds' attempts from the memory + if(last_second != c) + { + if(floods.count(last_second) > 0) + { + floods.erase(last_second); + } + last_second = c; + } +}
