3 * This program is free software; you can redistribute it and/or modify
4 * it under the terms of the GNU General Public License as published by
5 * the Free Software Foundation; either version 2 of the License, or
6 * (at your option) any later version.
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
13 * You should have received a copy of the GNU General Public License along
14 * with this program; if not, write to the Free Software Foundation, Inc.,
15 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
16 * http://www.gnu.org/copyleft/gpl.html
22 namespace MediaWiki\Auth
;
28 * A pre-authentication provider to throttle authentication actions.
30 * Adding this provider will throttle account creations and primary authentication attempts
31 * (more specifically, any authentication that returns FAIL on failure). Secondary authentication
32 * cannot be easily throttled on a framework level (since it would typically return UI on failure);
33 * secondary providers are expected to do their own throttling.
37 class ThrottlePreAuthenticationProvider
extends AbstractPreAuthenticationProvider
{
39 protected $throttleSettings;
42 protected $accountCreationThrottle;
45 protected $passwordAttemptThrottle;
51 * @param array $params
52 * - accountCreationThrottle: (array) Condition array for the account creation throttle; an array
53 * of arrays in a format like $wgPasswordAttemptThrottle, passed to the Throttler constructor.
54 * - passwordAttemptThrottle: (array) Condition array for the password attempt throttle, in the
55 * same format as accountCreationThrottle.
56 * - cache: (BagOStuff) Where to store the throttle, defaults to the local cluster instance.
58 public function __construct( $params = [] ) {
59 $this->throttleSettings
= array_intersect_key( $params,
60 [ 'accountCreationThrottle' => true, 'passwordAttemptThrottle' => true ] );
61 $this->cache
= isset( $params['cache'] ) ?
$params['cache'] :
62 \ObjectCache
::getLocalClusterInstance();
65 public function setConfig( Config
$config ) {
66 parent
::setConfig( $config );
68 $accountCreationThrottle = $this->config
->get( 'AccountCreationThrottle' );
69 // Handle old $wgAccountCreationThrottle format (number of attempts per 24 hours)
70 if ( !is_array( $accountCreationThrottle ) ) {
71 $accountCreationThrottle = [ [
72 'count' => $accountCreationThrottle,
77 // @codeCoverageIgnoreStart
78 $this->throttleSettings +
= [
79 // @codeCoverageIgnoreEnd
80 'accountCreationThrottle' => $accountCreationThrottle,
81 'passwordAttemptThrottle' => $this->config
->get( 'PasswordAttemptThrottle' ),
84 if ( !empty( $this->throttleSettings
['accountCreationThrottle'] ) ) {
85 $this->accountCreationThrottle
= new Throttler(
86 $this->throttleSettings
['accountCreationThrottle'], [
87 'type' => 'acctcreate',
88 'cache' => $this->cache
,
92 if ( !empty( $this->throttleSettings
['passwordAttemptThrottle'] ) ) {
93 $this->passwordAttemptThrottle
= new Throttler(
94 $this->throttleSettings
['passwordAttemptThrottle'], [
96 'cache' => $this->cache
,
102 public function testForAccountCreation( $user, $creator, array $reqs ) {
103 if ( !$this->accountCreationThrottle ||
!$creator->isPingLimitable() ) {
104 return \StatusValue
::newGood();
107 $ip = $this->manager
->getRequest()->getIP();
109 if ( !\Hooks
::run( 'ExemptFromAccountCreationThrottle', [ $ip ] ) ) {
110 $this->logger
->debug( __METHOD__
. ": a hook allowed account creation w/o throttle\n" );
111 return \StatusValue
::newGood();
114 $result = $this->accountCreationThrottle
->increase( null, $ip, __METHOD__
);
116 $message = wfMessage( 'acct_creation_throttle_hit' )->params( $result['count'] )
117 ->durationParams( $result['wait'] );
118 return \StatusValue
::newFatal( $message );
121 return \StatusValue
::newGood();
124 public function testForAuthentication( array $reqs ) {
125 if ( !$this->passwordAttemptThrottle
) {
126 return \StatusValue
::newGood();
129 $ip = $this->manager
->getRequest()->getIP();
131 $username = AuthenticationRequest
::getUsernameFromRequests( $reqs );
132 } catch ( \UnexpectedValueException
$e ) {
136 // Get everything this username could normalize to, and throttle each one individually.
137 // If nothing uses usernames, just throttle by IP.
138 $usernames = $this->manager
->normalizeUsername( $username );
140 foreach ( $usernames as $name ) {
141 $r = $this->passwordAttemptThrottle
->increase( $name, $ip, __METHOD__
);
142 if ( $r && ( !$result ||
$result['wait'] < $r['wait'] ) ) {
148 $message = wfMessage( 'login-throttled' )->durationParams( $result['wait'] );
149 return \StatusValue
::newFatal( $message );
151 $this->manager
->setAuthenticationSessionData( 'LoginThrottle',
152 [ 'users' => $usernames, 'ip' => $ip ] );
153 return \StatusValue
::newGood();
158 * @param null|\User $user
159 * @param AuthenticationResponse $response
161 public function postAuthentication( $user, AuthenticationResponse
$response ) {
162 if ( $response->status
!== AuthenticationResponse
::PASS
) {
164 } elseif ( !$this->passwordAttemptThrottle
) {
168 $data = $this->manager
->getAuthenticationSessionData( 'LoginThrottle' );
170 $this->logger
->error( 'throttler data not found for {user}', [ 'user' => $user->getName() ] );
174 foreach ( $data['users'] as $name ) {
175 $this->passwordAttemptThrottle
->clear( $name, $data['ip'] );