Completed
Push — try/user_token-auth-for-rest-a... ( 422660...ea5d0d )
by
unknown
08:47
created

modules/protect.php (3 issues)

Upgrade to new PHP Analysis Engine

These results are based on our legacy PHP analysis, consider migrating to our new PHP analysis engine instead. Learn more

1
<?php
2
/**
3
 * Module Name: Protect
4
 * Module Description: Prevent and block malicious login attempts.
5
 * Sort Order: 1
6
 * Recommendation Order: 4
7
 * First Introduced: 3.4
8
 * Requires Connection: Yes
9
 * Auto Activate: Yes
10
 * Module Tags: Recommended
11
 * Feature: Security
12
 * Additional Search Queries: security, secure, protection, botnet, brute force, protect, login
13
 */
14
15
include_once JETPACK__PLUGIN_DIR . 'modules/protect/shared-functions.php';
16
17
class Jetpack_Protect_Module {
18
19
	private static $__instance = null;
20
	public $api_key;
21
	public $api_key_error;
22
	public $whitelist;
23
	public $whitelist_error;
24
	public $whitelist_saved;
25
	private $user_ip;
26
	private $local_host;
27
	private $api_endpoint;
28
	public $last_request;
29
	public $last_response_raw;
30
	public $last_response;
31
	private $block_login_with_math;
32
33
	/**
34
	 * Singleton implementation
35
	 *
36
	 * @return object
37
	 */
38
	public static function instance() {
39
		if ( ! is_a( self::$__instance, 'Jetpack_Protect_Module' ) ) {
40
			self::$__instance = new Jetpack_Protect_Module();
41
		}
42
43
		return self::$__instance;
44
	}
45
46
	/**
47
	 * Registers actions
48
	 */
49
	private function __construct() {
50
		add_action( 'jetpack_activate_module_protect', array ( $this, 'on_activation' ) );
51
		add_action( 'jetpack_deactivate_module_protect', array ( $this, 'on_deactivation' ) );
52
		add_action( 'jetpack_modules_loaded', array ( $this, 'modules_loaded' ) );
53
		add_action( 'login_init', array ( $this, 'check_use_math' ) );
54
		add_filter( 'authenticate', array ( $this, 'check_preauth' ), 10, 3 );
55
		add_action( 'wp_login', array ( $this, 'log_successful_login' ), 10, 2 );
56
		add_action( 'wp_login_failed', array ( $this, 'log_failed_attempt' ) );
57
		add_action( 'admin_init', array ( $this, 'maybe_update_headers' ) );
58
		add_action( 'admin_init', array ( $this, 'maybe_display_security_warning' ) );
59
60
		// This is a backup in case $pagenow fails for some reason
61
		add_action( 'login_head', array ( $this, 'check_login_ability' ) );
62
63
		// Runs a script every day to clean up expired transients so they don't
64
		// clog up our users' databases
65
		require_once( JETPACK__PLUGIN_DIR . '/modules/protect/transient-cleanup.php' );
66
	}
67
68
	/**
69
	 * On module activation, try to get an api key
70
	 */
71
	public function on_activation() {
72
		if ( is_multisite() && is_main_site() && get_site_option( 'jetpack_protect_active', 0 ) == 0 ) {
73
			update_site_option( 'jetpack_protect_active', 1 );
74
		}
75
76
		update_site_option( 'jetpack_protect_activating', 'activating' );
77
78
		// Get BruteProtect's counter number
79
		Jetpack_Protect_Module::protect_call( 'check_key' );
80
	}
81
82
	/**
83
	 * On module deactivation, unset protect_active
84
	 */
85
	public function on_deactivation() {
86
		if ( is_multisite() && is_main_site() ) {
87
			update_site_option( 'jetpack_protect_active', 0 );
88
		}
89
	}
90
91
	public function maybe_get_protect_key() {
92
		if ( get_site_option( 'jetpack_protect_activating', false ) && ! get_site_option( 'jetpack_protect_key', false ) ) {
93
			$key = $this->get_protect_key();
94
			delete_site_option( 'jetpack_protect_activating' );
95
			return $key;
96
		}
97
98
		return get_site_option( 'jetpack_protect_key' );
99
	}
100
101
	/**
102
	 * Sends a "check_key" API call once a day.  This call allows us to track IP-related
103
	 * headers for this server via the Protect API, in order to better identify the source
104
	 * IP for login attempts
105
	 */
106
	public function maybe_update_headers( $force = false ) {
107
		$updated_recently = $this->get_transient( 'jpp_headers_updated_recently' );
108
109
		if ( ! $force ) {
110
			if ( isset( $_GET['protect_update_headers'] ) ) {
111
				$force = true;
112
			}
113
		}
114
115
		// check that current user is admin so we prevent a lower level user from adding
116
		// a trusted header, allowing them to brute force an admin account
117
		if ( ( $updated_recently && ! $force ) || ! current_user_can( 'update_plugins' ) ) {
118
			return;
119
		}
120
121
		$response = Jetpack_Protect_Module::protect_call( 'check_key' );
122
		$this->set_transient( 'jpp_headers_updated_recently', 1, DAY_IN_SECONDS );
123
124
		if ( isset( $response['msg'] ) && $response['msg'] ) {
125
			update_site_option( 'trusted_ip_header', json_decode( $response['msg'] ) );
126
		}
127
128
	}
129
130
	public function maybe_display_security_warning() {
131
		if ( is_multisite() && current_user_can( 'manage_network' ) ) {
132
			if ( ! function_exists( 'is_plugin_active_for_network' ) ) {
133
				require_once( ABSPATH . '/wp-admin/includes/plugin.php' );
134
			}
135
136
			if ( ! is_plugin_active_for_network( 'jetpack/jetpack.php' ) ) {
137
				add_action( 'load-index.php', array ( $this, 'prepare_jetpack_protect_multisite_notice' ) );
138
			}
139
		}
140
	}
141
142
	public function prepare_jetpack_protect_multisite_notice() {
143
		add_action( 'admin_print_styles', array ( $this, 'admin_banner_styles' ) );
144
		add_action( 'admin_notices', array ( $this, 'admin_jetpack_manage_notice' ) );
145
	}
146
147
	public function admin_banner_styles() {
148
		global $wp_styles;
149
150
		$min = ( defined( 'SCRIPT_DEBUG' ) && SCRIPT_DEBUG ) ? '' : '.min';
151
152
		wp_enqueue_style( 'jetpack', plugins_url( "css/jetpack-banners{$min}.css", JETPACK__PLUGIN_FILE ), false, JETPACK__VERSION );
153
		$wp_styles->add_data( 'jetpack', 'rtl', true );
154
	}
155
156
	public function admin_jetpack_manage_notice() {
157
158
		$dismissed = get_site_option( 'jetpack_dismissed_protect_multisite_banner' );
159
160
		if ( $dismissed ) {
161
			return;
162
		}
163
164
		$referer     = '&_wp_http_referer=' . add_query_arg( '_wp_http_referer', null );
165
		$opt_out_url = wp_nonce_url( Jetpack::admin_url( 'jetpack-notice=jetpack-protect-multisite-opt-out' . $referer ), 'jetpack_protect_multisite_banner_opt_out' );
166
167
		?>
168
		<div id="message" class="updated jetpack-message jp-banner is-opt-in protect-error"
169
		     style="display:block !important;">
170
			<a class="jp-banner__dismiss" href="<?php echo esc_url( $opt_out_url ); ?>"
171
			   title="<?php esc_attr_e( 'Dismiss this notice.', 'jetpack' ); ?>"></a>
172
173
			<div class="jp-banner__content">
174
				<h2><?php esc_html_e( 'Protect cannot keep your site secure.', 'jetpack' ); ?></h2>
175
176
				<p><?php printf( __( 'Thanks for activating Protect! To start protecting your site, please network activate Jetpack on your Multisite installation and activate Protect on your primary site. Due to the way logins are handled on WordPress Multisite, Jetpack must be network-enabled in order for Protect to work properly. <a href="%s" target="_blank">Learn More</a>', 'jetpack' ), 'http://jetpack.com/support/multisite-protect' ); ?></p>
177
			</div>
178
			<div class="jp-banner__action-container is-opt-in">
179
				<a href="<?php echo esc_url( network_admin_url( 'plugins.php' ) ); ?>" class="jp-banner__button"
180
				   id="wpcom-connect"><?php _e( 'View Network Admin', 'jetpack' ); ?></a>
181
			</div>
182
		</div>
183
		<?php
184
	}
185
186
	/**
187
	 * Request an api key from wordpress.com
188
	 *
189
	 * @return bool | string
190
	 */
191
	public function get_protect_key() {
192
193
		$protect_blog_id = Jetpack_Protect_Module::get_main_blog_jetpack_id();
194
195
		// If we can't find the the blog id, that means we are on multisite, and the main site never connected
196
		// the protect api key is linked to the main blog id - instruct the user to connect their main blog
197
		if ( ! $protect_blog_id ) {
198
			$this->api_key_error = __( 'Your main blog is not connected to WordPress.com. Please connect to get an API key.', 'jetpack' );
199
200
			return false;
201
		}
202
203
		$request = array (
204
			'jetpack_blog_id'      => $protect_blog_id,
205
			'bruteprotect_api_key' => get_site_option( 'bruteprotect_api_key' ),
206
			'multisite'            => '0',
207
		);
208
209
		// Send the number of blogs on the network if we are on multisite
210
		if ( is_multisite() ) {
211
			$request['multisite'] = get_blog_count();
212
			if ( ! $request['multisite'] ) {
213
				global $wpdb;
214
				$request['multisite'] = $wpdb->get_var( "SELECT COUNT(blog_id) as c FROM $wpdb->blogs WHERE spam = '0' AND deleted = '0' and archived = '0'" );
215
			}
216
		}
217
218
		// Request the key
219
		Jetpack::load_xml_rpc_client();
220
		$xml = new Jetpack_IXR_Client( array (
221
			'user_id' => get_current_user_id()
222
		) );
223
		$xml->query( 'jetpack.protect.requestKey', $request );
224
225
		// Hmm, can't talk to wordpress.com
226
		if ( $xml->isError() ) {
227
			$code                = $xml->getErrorCode();
228
			$message             = $xml->getErrorMessage();
229
			$this->api_key_error = sprintf( __( 'Error connecting to WordPress.com. Code: %1$s, %2$s', 'jetpack' ), $code, $message );
230
231
			return false;
232
		}
233
234
		$response = $xml->getResponse();
235
236
		// Hmm. Can't talk to the protect servers ( api.bruteprotect.com )
237
		if ( ! isset( $response['data'] ) ) {
238
			$this->api_key_error = __( 'No reply from Jetpack servers', 'jetpack' );
239
240
			return false;
241
		}
242
243
		// There was an issue generating the key
244
		if ( empty( $response['success'] ) ) {
245
			$this->api_key_error = $response['data'];
246
247
			return false;
248
		}
249
250
		// Key generation successful!
251
		$active_plugins = Jetpack::get_active_plugins();
252
253
		// We only want to deactivate BruteProtect if we successfully get a key
254
		if ( in_array( 'bruteprotect/bruteprotect.php', $active_plugins ) ) {
255
			Jetpack_Client_Server::deactivate_plugin( 'bruteprotect/bruteprotect.php', 'BruteProtect' );
256
		}
257
258
		$key = $response['data'];
259
		update_site_option( 'jetpack_protect_key', $key );
260
261
		return $key;
262
	}
263
264
	/**
265
	 * Called via WP action wp_login_failed to log failed attempt with the api
266
	 *
267
	 * Fires custom, plugable action jpp_log_failed_attempt with the IP
268
	 *
269
	 * @return void
270
	 */
271
	function log_failed_attempt() {
272
		/**
273
		 * Fires before every failed login attempt.
274
		 *
275
		 * @module protect
276
		 *
277
		 * @since 3.4.0
278
		 *
279
		 * @param string jetpack_protect_get_ip IP stored by Protect.
280
		 */
281
		do_action( 'jpp_log_failed_attempt', jetpack_protect_get_ip() );
282
283
		if ( isset( $_COOKIE['jpp_math_pass'] ) ) {
284
285
			$transient = $this->get_transient( 'jpp_math_pass_' . $_COOKIE['jpp_math_pass'] );
286
			$transient--;
287
288
			if ( ! $transient || $transient < 1 ) {
289
				$this->delete_transient( 'jpp_math_pass_' . $_COOKIE['jpp_math_pass'] );
290
				setcookie( 'jpp_math_pass', 0, time() - DAY_IN_SECONDS, COOKIEPATH, COOKIE_DOMAIN, false );
291
			} else {
292
				$this->set_transient( 'jpp_math_pass_' . $_COOKIE['jpp_math_pass'], $transient, DAY_IN_SECONDS );
293
			}
294
295
		}
296
		$this->protect_call( 'failed_attempt' );
297
	}
298
299
	/**
300
	 * Set up the Protect configuration page
301
	 */
302
	public function modules_loaded() {
303
		Jetpack::enable_module_configurable( __FILE__ );
304
		Jetpack::module_configuration_load( __FILE__, array ( $this, 'configuration_load' ) );
305
		Jetpack::module_configuration_head( __FILE__, array ( $this, 'configuration_head' ) );
306
		Jetpack::module_configuration_screen( __FILE__, array ( $this, 'configuration_screen' ) );
307
	}
308
309
	/**
310
	 * Logs a successful login back to our servers, this allows us to make sure we're not blocking
311
	 * a busy IP that has a lot of good logins along with some forgotten passwords. Also saves current user's ip
312
	 * to the ip address whitelist
313
	 */
314
	public function log_successful_login( $user_login, $user ) {
315
		$this->protect_call( 'successful_login', array ( 'roles' => $user->roles ) );
316
	}
317
318
319
	/**
320
	 * Checks for loginability BEFORE authentication so that bots don't get to go around the log in form.
321
	 *
322
	 * If we are using our math fallback, authenticate via math-fallback.php
323
	 *
324
	 * @param string $user
325
	 * @param string $username
326
	 * @param string $password
327
	 *
328
	 * @return string $user
329
	 */
330
	function check_preauth( $user = 'Not Used By Protect', $username = 'Not Used By Protect', $password = 'Not Used By Protect' ) {
331
		$allow_login = $this->check_login_ability( true );
332
		$use_math    = $this->get_transient( 'brute_use_math' );
333
334
		if ( ! $allow_login ) {
335
			$this->block_with_math();
336
		}
337
338
		if ( ( 1 == $use_math || 1 == $this->block_login_with_math ) && isset( $_POST['log'] ) ) {
339
			include_once dirname( __FILE__ ) . '/protect/math-fallback.php';
340
			Jetpack_Protect_Math_Authenticate::math_authenticate();
341
		}
342
343
		return $user;
344
	}
345
346
	/**
347
	 * Get all IP headers so that we can process on our server...
348
	 *
349
	 * @return string
350
	 */
351
	function get_headers() {
352
		$ip_related_headers = array (
353
			'GD_PHP_HANDLER',
354
			'HTTP_AKAMAI_ORIGIN_HOP',
355
			'HTTP_CF_CONNECTING_IP',
356
			'HTTP_CLIENT_IP',
357
			'HTTP_FASTLY_CLIENT_IP',
358
			'HTTP_FORWARDED',
359
			'HTTP_FORWARDED_FOR',
360
			'HTTP_INCAP_CLIENT_IP',
361
			'HTTP_TRUE_CLIENT_IP',
362
			'HTTP_X_CLIENTIP',
363
			'HTTP_X_CLUSTER_CLIENT_IP',
364
			'HTTP_X_FORWARDED',
365
			'HTTP_X_FORWARDED_FOR',
366
			'HTTP_X_IP_TRAIL',
367
			'HTTP_X_REAL_IP',
368
			'HTTP_X_VARNISH',
369
			'REMOTE_ADDR'
370
		);
371
372
		foreach ( $ip_related_headers as $header ) {
373
			if ( isset( $_SERVER[ $header ] ) ) {
374
				$output[ $header ] = $_SERVER[ $header ];
375
			}
376
		}
377
378
		return $output;
379
	}
380
381
	/*
382
	 * Checks if the IP address has been whitelisted
383
	 *
384
	 * @param string $ip
385
	 *
386
	 * @return bool
387
	 */
388
	function ip_is_whitelisted( $ip ) {
389
		// If we found an exact match in wp-config
390
		if ( defined( 'JETPACK_IP_ADDRESS_OK' ) && JETPACK_IP_ADDRESS_OK == $ip ) {
391
			return true;
392
		}
393
394
		$whitelist = jetpack_protect_get_local_whitelist();
395
396
		if ( is_multisite() ) {
397
			$whitelist = array_merge( $whitelist, get_site_option( 'jetpack_protect_global_whitelist', array () ) );
398
		}
399
400
		if ( ! empty( $whitelist ) ) :
401
			foreach ( $whitelist as $item ) :
402
				// If the IPs are an exact match
403
				if ( ! $item->range && isset( $item->ip_address ) && $item->ip_address == $ip ) {
404
					return true;
405
				}
406
407
				if ( $item->range && isset( $item->range_low ) && isset( $item->range_high ) ) {
408
					if ( jetpack_protect_ip_address_is_in_range( $ip, $item->range_low, $item->range_high ) ) {
409
						return true;
410
					}
411
				}
412
			endforeach;
413
		endif;
414
415
		return false;
416
	}
417
418
	/**
419
	 * Checks the status for a given IP. API results are cached as transients
420
	 *
421
	 * @param bool $preauth Whether or not we are checking prior to authorization
422
	 *
423
	 * @return bool Either returns true, fires $this->kill_login, or includes a math fallback and returns false
424
	 */
425
	function check_login_ability( $preauth = false ) {
426
		$ip = jetpack_protect_get_ip();
427
428
		// Server is misconfigured and we can't get an IP
429
		if ( ! $ip && class_exists( 'Jetpack' ) ) {
0 ignored issues
show
Bug Best Practice introduced by
The expression $ip of type false|string is loosely compared to false; this is ambiguous if the string can be empty. You might want to explicitly use === false instead.

In PHP, under loose comparison (like ==, or !=, or switch conditions), values of different types might be equal.

For string values, the empty string '' is a special case, in particular the following results might be unexpected:

''   == false // true
''   == null  // true
'ab' == false // false
'ab' == null  // false

// It is often better to use strict comparison
'' === false // false
'' === null  // false
Loading history...
430
			Jetpack::deactivate_module( 'protect' );
431
			ob_start();
432
			Jetpack::state( 'message', 'protect_misconfigured_ip' );
433
			ob_end_clean();
434
			return true;
435
		}
436
		
437
		/**
438
		 * Short-circuit check_login_ability. 
439
		 *
440
		 * If there is an alternate way to validate the current IP such as
441
		 * a hard-coded list of IP addresses, we can short-circuit the rest
442
		 * of the login ability checks and return true here.
443
		 *
444
		 * @module protect
445
		 *
446
		 * @since 4.4.0
447
		 *
448
		 * @param bool false Should we allow all logins for the current ip? Default: false
449
		 */
450
		if ( apply_filters( 'jpp_allow_login', false, $ip ) ) {
451
			return true;
452
		}
453
		
454
		$headers         = $this->get_headers();
455
		$header_hash     = md5( json_encode( $headers ) );
456
		$transient_name  = 'jpp_li_' . $header_hash;
457
		$transient_value = $this->get_transient( $transient_name );
458
459
		if ( jetpack_protect_ip_is_private( $ip ) ) {
0 ignored issues
show
$ip is of type false|string, but the function expects a integer.

It seems like the type of the argument is not accepted by the function/method which you are calling.

In some cases, in particular if PHP’s automatic type-juggling kicks in this might be fine. In other cases, however this might be a bug.

We suggest to add an explicit type cast like in the following example:

function acceptsInteger($int) { }

$x = '123'; // string "123"

// Instead of
acceptsInteger($x);

// we recommend to use
acceptsInteger((integer) $x);
Loading history...
460
			return true;
461
		}
462
463
		if ( $this->ip_is_whitelisted( $ip ) ) {
0 ignored issues
show
It seems like $ip defined by jetpack_protect_get_ip() on line 426 can also be of type false; however, Jetpack_Protect_Module::ip_is_whitelisted() does only seem to accept string, did you maybe forget to handle an error condition?

This check looks for type mismatches where the missing type is false. This is usually indicative of an error condtion.

Consider the follow example

<?php

function getDate($date)
{
    if ($date !== null) {
        return new DateTime($date);
    }

    return false;
}

This function either returns a new DateTime object or false, if there was an error. This is a typical pattern in PHP programming to show that an error has occurred without raising an exception. The calling code should check for this returned false before passing on the value to another function or method that may not be able to handle a false.

Loading history...
464
			return true;
465
		}
466
467
		// Check out our transients
468
		if ( isset( $transient_value ) && 'ok' == $transient_value['status'] ) {
469
			return true;
470
		}
471
472
		if ( isset( $transient_value ) && 'blocked' == $transient_value['status'] ) {
473
			$this->block_with_math();
474
		}
475
476
		if ( isset( $transient_value ) && 'blocked-hard' == $transient_value['status'] ) {
477
			$this->kill_login();
478
		}
479
480
		// If we've reached this point, this means that the IP isn't cached.
481
		// Now we check with the Protect API to see if we should allow login
482
		$response = $this->protect_call( $action = 'check_ip' );
483
484
		if ( isset( $response['math'] ) && ! function_exists( 'brute_math_authenticate' ) ) {
485
			include_once dirname( __FILE__ ) . '/protect/math-fallback.php';
486
			new Jetpack_Protect_Math_Authenticate;
487
488
			return false;
489
		}
490
491
		if ( 'blocked' == $response['status'] ) {
492
			$this->block_with_math();
493
		}
494
495
		if ( 'blocked-hard' == $response['status'] ) {
496
			$this->kill_login();
497
		}
498
499
		return true;
500
	}
501
502
	function block_with_math() {
503
		/**
504
		 * By default, Protect will allow a user who has been blocked for too
505
		 * many failed logins to start answering math questions to continue logging in
506
		 *
507
		 * For added security, you can disable this.
508
		 *
509
		 * @module protect
510
		 *
511
		 * @since 3.6.0
512
		 *
513
		 * @param bool Whether to allow math for blocked users or not.
514
		 */
515
516
		$this->block_login_with_math = 1;
517
		/**
518
		 * Allow Math fallback for blocked IPs.
519
		 *
520
		 * @module protect
521
		 *
522
		 * @since 3.6.0
523
		 *
524
		 * @param bool true Should we fallback to the Math questions when an IP is blocked. Default to true.
525
		 */
526
		$allow_math_fallback_on_fail = apply_filters( 'jpp_use_captcha_when_blocked', true );
527
		if ( ! $allow_math_fallback_on_fail ) {
528
			$this->kill_login();
529
		}
530
		include_once dirname( __FILE__ ) . '/protect/math-fallback.php';
531
		new Jetpack_Protect_Math_Authenticate;
532
533
		return false;
534
	}
535
536
	/*
537
	 * Kill a login attempt
538
	 */
539
	function kill_login() {
540
		$ip = jetpack_protect_get_ip();
541
		/**
542
		 * Fires before every killed login.
543
		 *
544
		 * @module protect
545
		 *
546
		 * @since 3.4.0
547
		 *
548
		 * @param string $ip IP flagged by Protect.
549
		 */
550
		do_action( 'jpp_kill_login', $ip );
551
		$help_url = 'http://jetpack.com/support/security/';
552
553
		$die_string = sprintf( __( 'Your IP (%1$s) has been flagged for potential security violations.  <a href="%2$s">Find out more...</a>', 'jetpack' ), str_replace( 'http://', '', esc_url( 'http://' . $ip ) ), esc_url( $help_url ) );
554
555
		if( defined( 'XMLRPC_REQUEST' ) && XMLRPC_REQUEST ) {
556
			$die_string = sprintf( __( 'Your IP (%1$s) has been flagged for potential security violations.', 'jetpack' ), str_replace( 'http://', '', esc_url( 'http://' . $ip ) ) );
557
		}
558
559
		wp_die(
560
			$die_string,
561
			__( 'Login Blocked by Jetpack', 'jetpack' ),
562
			array ( 'response' => 403 )
563
		);
564
	}
565
566
	/*
567
	 * Checks if the protect API call has failed, and if so initiates the math captcha fallback.
568
	 */
569
	public function check_use_math() {
570
		$use_math = $this->get_transient( 'brute_use_math' );
571
		if ( $use_math ) {
572
			include_once dirname( __FILE__ ) . '/protect/math-fallback.php';
573
			new Jetpack_Protect_Math_Authenticate;
574
		}
575
	}
576
577
	/**
578
	 * Get or delete API key
579
	 */
580
	public function configuration_load() {
581
582
		if ( isset( $_POST['action'] ) && $_POST['action'] == 'jetpack_protect_save_whitelist' && wp_verify_nonce( $_POST['_wpnonce'], 'jetpack-protect' ) ) {
583
			$whitelist             = str_replace( ' ', '', $_POST['whitelist'] );
584
			$whitelist             = explode( PHP_EOL, $whitelist );
585
			$result                = jetpack_protect_save_whitelist( $whitelist );
586
			$this->whitelist_saved = ! is_wp_error( $result );
587
			$this->whitelist_error = is_wp_error( $result );
588
		}
589
590
		if ( isset( $_POST['action'] ) && 'get_protect_key' == $_POST['action'] && wp_verify_nonce( $_POST['_wpnonce'], 'jetpack-protect' ) ) {
591
			$result = $this->get_protect_key();
592
			// Only redirect on success
593
			// If it fails we need access to $this->api_key_error
594
			if ( $result ) {
595
				wp_safe_redirect( Jetpack::module_configuration_url( 'protect' ) );
596
			}
597
		}
598
599
		$this->api_key = get_site_option( 'jetpack_protect_key', false );
600
		$this->user_ip = jetpack_protect_get_ip();
601
	}
602
603
	public function configuration_head() {
604
		wp_enqueue_style( 'jetpack-protect' );
605
	}
606
607
	/**
608
	 * Prints the configuration screen
609
	 */
610
	public function configuration_screen() {
611
		require_once dirname( __FILE__ ) . '/protect/config-ui.php';
612
	}
613
614
	/**
615
	 * If we're in a multisite network, return the blog ID of the primary blog
616
	 *
617
	 * @return int
618
	 */
619
	public function get_main_blog_id() {
620
		if ( ! is_multisite() ) {
621
			return false;
622
		}
623
624
		global $current_site;
625
		$primary_blog_id = $current_site->blog_id;
626
627
		return $primary_blog_id;
628
	}
629
630
	/**
631
	 * Get jetpack blog id, or the jetpack blog id of the main blog in the main network
632
	 *
633
	 * @return int
634
	 */
635
	public function get_main_blog_jetpack_id() {
636
		if ( ! is_main_site() ) {
637
			switch_to_blog( $this->get_main_blog_id() );
638
			$id = Jetpack::get_option( 'id', false );
639
			restore_current_blog();
640
		} else {
641
			$id = Jetpack::get_option( 'id' );
642
		}
643
644
		return $id;
645
	}
646
647
	public function check_api_key() {
648
		$response = $this->protect_call( 'check_key' );
649
650
		if ( isset( $response['ckval'] ) ) {
651
			return true;
652
		}
653
654
		if ( isset( $response['error'] ) ) {
655
656
			if ( $response['error'] == 'Invalid API Key' ) {
657
				$this->api_key_error = __( 'Your API key is invalid', 'jetpack' );
658
			}
659
660
			if ( $response['error'] == 'API Key Required' ) {
661
				$this->api_key_error = __( 'No API key', 'jetpack' );
662
			}
663
		}
664
665
		$this->api_key_error = __( 'There was an error contacting Jetpack servers.', 'jetpack' );
666
667
		return false;
668
	}
669
670
	/**
671
	 * Calls over to the api using wp_remote_post
672
	 *
673
	 * @param string $action 'check_ip', 'check_key', or 'failed_attempt'
674
	 * @param array $request Any custom data to post to the api
675
	 *
676
	 * @return array
677
	 */
678
	function protect_call( $action = 'check_ip', $request = array () ) {
679
		global $wp_version, $wpdb, $current_user;
680
681
		$api_key = $this->maybe_get_protect_key();
682
683
		$user_agent = "WordPress/{$wp_version} | Jetpack/" . constant( 'JETPACK__VERSION' );
684
685
		$request['action']            = $action;
686
		$request['ip']                = jetpack_protect_get_ip();
687
		$request['host']              = $this->get_local_host();
688
		$request['headers']           = json_encode( $this->get_headers() );
689
		$request['jetpack_version']   = constant( 'JETPACK__VERSION' );
690
		$request['wordpress_version'] = strval( $wp_version );
691
		$request['api_key']           = $api_key;
692
		$request['multisite']         = "0";
693
694
		if ( is_multisite() ) {
695
			$request['multisite'] = get_blog_count();
696
		}
697
698
699
		/**
700
		 * Filter controls maximum timeout in waiting for reponse from Protect servers.
701
		 *
702
		 * @module protect
703
		 *
704
		 * @since 4.0.4
705
		 *
706
		 * @param int $timeout Max time (in seconds) to wait for a response.
707
		 */
708
		$timeout = apply_filters( 'jetpack_protect_connect_timeout', 30 );
709
710
		$args = array (
711
			'body'        => $request,
712
			'user-agent'  => $user_agent,
713
			'httpversion' => '1.0',
714
			'timeout'     => absint( $timeout )
715
		);
716
717
		$response_json           = wp_remote_post( $this->get_api_host(), $args );
718
		$this->last_response_raw = $response_json;
719
		$headers                 = $this->get_headers();
720
		$header_hash             = md5( json_encode( $headers ) );
721
		$transient_name          = 'jpp_li_' . $header_hash;
722
		$this->delete_transient( $transient_name );
723
724
		if ( is_array( $response_json ) ) {
725
			$response = json_decode( $response_json['body'], true );
726
		}
727
728
		if ( isset( $response['blocked_attempts'] ) && $response['blocked_attempts'] ) {
729
			update_site_option( 'jetpack_protect_blocked_attempts', $response['blocked_attempts'] );
730
		}
731
732
		if ( isset( $response['status'] ) && ! isset( $response['error'] ) ) {
733
			$response['expire'] = time() + $response['seconds_remaining'];
734
			$this->set_transient( $transient_name, $response, $response['seconds_remaining'] );
735
			$this->delete_transient( 'brute_use_math' );
736
		} else { // Fallback to Math Captcha if no response from API host
737
			$this->set_transient( 'brute_use_math', 1, 600 );
738
			$response['status'] = 'ok';
739
			$response['math']   = true;
740
		}
741
742
		if ( isset( $response['error'] ) ) {
743
			update_site_option( 'jetpack_protect_error', $response['error'] );
744
		} else {
745
			delete_site_option( 'jetpack_protect_error' );
746
		}
747
748
		return $response;
749
	}
750
751
752
	/**
753
	 * Wrapper for WordPress set_transient function, our version sets
754
	 * the transient on the main site in the network if this is a multisite network
755
	 *
756
	 * We do it this way (instead of set_site_transient) because of an issue where
757
	 * sitewide transients are always autoloaded
758
	 * https://core.trac.wordpress.org/ticket/22846
759
	 *
760
	 * @param string $transient Transient name. Expected to not be SQL-escaped. Must be
761
	 *                           45 characters or fewer in length.
762
	 * @param mixed $value Transient value. Must be serializable if non-scalar.
763
	 *                           Expected to not be SQL-escaped.
764
	 * @param int $expiration Optional. Time until expiration in seconds. Default 0.
765
	 *
766
	 * @return bool False if value was not set and true if value was set.
767
	 */
768
	function set_transient( $transient, $value, $expiration ) {
769
		if ( is_multisite() && ! is_main_site() ) {
770
			switch_to_blog( $this->get_main_blog_id() );
771
			$return = set_transient( $transient, $value, $expiration );
772
			restore_current_blog();
773
774
			return $return;
775
		}
776
777
		return set_transient( $transient, $value, $expiration );
778
	}
779
780
	/**
781
	 * Wrapper for WordPress delete_transient function, our version deletes
782
	 * the transient on the main site in the network if this is a multisite network
783
	 *
784
	 * @param string $transient Transient name. Expected to not be SQL-escaped.
785
	 *
786
	 * @return bool true if successful, false otherwise
787
	 */
788 View Code Duplication
	function delete_transient( $transient ) {
789
		if ( is_multisite() && ! is_main_site() ) {
790
			switch_to_blog( $this->get_main_blog_id() );
791
			$return = delete_transient( $transient );
792
			restore_current_blog();
793
794
			return $return;
795
		}
796
797
		return delete_transient( $transient );
798
	}
799
800
	/**
801
	 * Wrapper for WordPress get_transient function, our version gets
802
	 * the transient on the main site in the network if this is a multisite network
803
	 *
804
	 * @param string $transient Transient name. Expected to not be SQL-escaped.
805
	 *
806
	 * @return mixed Value of transient.
807
	 */
808 View Code Duplication
	function get_transient( $transient ) {
809
		if ( is_multisite() && ! is_main_site() ) {
810
			switch_to_blog( $this->get_main_blog_id() );
811
			$return = get_transient( $transient );
812
			restore_current_blog();
813
814
			return $return;
815
		}
816
817
		return get_transient( $transient );
818
	}
819
820
	function get_api_host() {
821
		if ( isset( $this->api_endpoint ) ) {
822
			return $this->api_endpoint;
823
		}
824
825
		//Check to see if we can use SSL
826
		$this->api_endpoint = Jetpack::fix_url_for_bad_hosts( JETPACK_PROTECT__API_HOST );
827
828
		return $this->api_endpoint;
829
	}
830
831
	function get_local_host() {
832
		if ( isset( $this->local_host ) ) {
833
			return $this->local_host;
834
		}
835
836
		$uri = 'http://' . strtolower( $_SERVER['HTTP_HOST'] );
837
838
		if ( is_multisite() ) {
839
			$uri = network_home_url();
840
		}
841
842
		$uridata = parse_url( $uri );
843
844
		$domain = $uridata['host'];
845
846
		// If we still don't have the site_url, get it
847
		if ( ! $domain ) {
848
			$uri     = get_site_url( 1 );
849
			$uridata = parse_url( $uri );
850
			$domain  = $uridata['host'];
851
		}
852
853
		$this->local_host = $domain;
854
855
		return $this->local_host;
856
	}
857
858
}
859
860
Jetpack_Protect_Module::instance();
861
862
if ( isset( $pagenow ) && 'wp-login.php' == $pagenow ) {
863
	Jetpack_Protect_Module::check_login_ability();
864
}
865