mirror of https://github.com/bjdgyc/anylink.git
1.重构防爆逻辑,基于IP+UserName锁定(单位时间内,锁定相同IP下的相同用户,其它IP和用户不影响)
2.增加基于用户的全局锁定 3.增加基于IP的全局锁定 4.用户单位时间内的请求频率限制(暂未开放)
This commit is contained in:
parent
9e700830be
commit
2fedb281e8
|
@ -85,10 +85,19 @@ type ServerConfig struct {
|
||||||
DisplayError bool `json:"display_error"`
|
DisplayError bool `json:"display_error"`
|
||||||
ExcludeExportIp bool `json:"exclude_export_ip"`
|
ExcludeExportIp bool `json:"exclude_export_ip"`
|
||||||
|
|
||||||
MaxBanCount int `json:"max_ban_score"`
|
AntiBruteForce bool `json:"anti_brute_force"`
|
||||||
BanResetTime int `json:"ban_reset_time"`
|
|
||||||
LockTime int `json:"lock_time"`
|
MaxBanCount int `json:"max_ban_score"`
|
||||||
UserStateExpiration int `json:"user_state_expiration"`
|
BanResetTime int `json:"ban_reset_time"`
|
||||||
|
LockTime int `json:"lock_time"`
|
||||||
|
|
||||||
|
MaxGlobalUserBanCount int `json:"max_global_user_ban_count"`
|
||||||
|
GlobalUserBanResetTime int `json:"global_user_ban_reset_time"`
|
||||||
|
GlobalUserLockTime int `json:"global_user_lock_time"`
|
||||||
|
|
||||||
|
MaxGlobalIPBanCount int `json:"max_global_ip_ban_count"`
|
||||||
|
GlobalIPBanResetTime int `json:"global_ip_ban_reset_time"`
|
||||||
|
GlobalIPLockTime int `json:"global_ip_lock_time"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func initServerCfg() {
|
func initServerCfg() {
|
||||||
|
|
|
@ -72,10 +72,19 @@ var configs = []config{
|
||||||
{Typ: cfgBool, Name: "display_error", Usage: "客户端显示详细错误信息(线上环境慎开启)", ValBool: false},
|
{Typ: cfgBool, Name: "display_error", Usage: "客户端显示详细错误信息(线上环境慎开启)", ValBool: false},
|
||||||
{Typ: cfgBool, Name: "exclude_export_ip", Usage: "排除出口ip路由(出口ip不加密传输)", ValBool: true},
|
{Typ: cfgBool, Name: "exclude_export_ip", Usage: "排除出口ip路由(出口ip不加密传输)", ValBool: true},
|
||||||
|
|
||||||
|
{Typ: cfgBool, Name: "anti_brute_force", Usage: "是否开启防爆功能", ValBool: true},
|
||||||
|
|
||||||
{Typ: cfgInt, Name: "max_ban_score", Usage: "单位时间内最大尝试次数,0为关闭防爆功能", ValInt: 5},
|
{Typ: cfgInt, Name: "max_ban_score", Usage: "单位时间内最大尝试次数,0为关闭防爆功能", ValInt: 5},
|
||||||
{Typ: cfgInt, Name: "ban_reset_time", Usage: "设置单位时间(秒),超过则重置计数", ValInt: 1},
|
{Typ: cfgInt, Name: "ban_reset_time", Usage: "设置单位时间(秒),超过则重置计数", ValInt: 10},
|
||||||
{Typ: cfgInt, Name: "lock_time", Usage: "超过最大尝试次数后的锁定时长(秒)", ValInt: 300},
|
{Typ: cfgInt, Name: "lock_time", Usage: "超过最大尝试次数后的锁定时长(秒)", ValInt: 300},
|
||||||
{Typ: cfgInt, Name: "user_state_expiration", Usage: "用户状态的保存周期(秒),超过则清空计数", ValInt: 900},
|
|
||||||
|
{Typ: cfgInt, Name: "max_global_user_ban_count", Usage: "全局用户单位时间内最大尝试次数", ValInt: 20},
|
||||||
|
{Typ: cfgInt, Name: "global_user_ban_reset_time", Usage: "全局用户设置单位时间(秒)", ValInt: 600},
|
||||||
|
{Typ: cfgInt, Name: "global_user_lock_time", Usage: "全局用户锁定时间(秒)", ValInt: 300},
|
||||||
|
|
||||||
|
{Typ: cfgInt, Name: "max_global_ip_ban_count", Usage: "全局IP单位时间内最大尝试次数", ValInt: 40},
|
||||||
|
{Typ: cfgInt, Name: "global_ip_ban_reset_time", Usage: "全局IP设置单位时间(秒)", ValInt: 1200},
|
||||||
|
{Typ: cfgInt, Name: "global_ip_lock_time", Usage: "全局IP锁定时间(秒)", ValInt: 300},
|
||||||
}
|
}
|
||||||
|
|
||||||
var envs = map[string]string{}
|
var envs = map[string]string{}
|
||||||
|
|
|
@ -53,14 +53,29 @@ ipv4_end = "192.168.90.200"
|
||||||
#是否自动添加nat
|
#是否自动添加nat
|
||||||
iptables_nat = true
|
iptables_nat = true
|
||||||
|
|
||||||
#单位时间内最大尝试次数,0为关闭防爆功能
|
#防爆全局开关
|
||||||
|
anti_brute_force = true
|
||||||
|
|
||||||
|
#单位时间内最大尝试次数,0为全局关闭防爆功能
|
||||||
max_ban_score = 5
|
max_ban_score = 5
|
||||||
#设置单位时间(秒),超过则重置计数
|
#设置单位时间(秒),超过则重置计数
|
||||||
ban_reset_time = 10
|
ban_reset_time = 10
|
||||||
#超过最大尝试次数后的锁定时长(秒)
|
#超过最大尝试次数后的锁定时长(秒)
|
||||||
lock_time = 300
|
lock_time = 300
|
||||||
#用户状态的保存周期(秒),超过则清空计数
|
|
||||||
user_state_expiration = 900
|
#全局用户单位时间内最大尝试次数,0为关闭该功能
|
||||||
|
max_global_user_ban_count = 20
|
||||||
|
#全局用户设置单位时间(秒)
|
||||||
|
global_user_ban_reset_time = 600
|
||||||
|
#全局用户锁定时间(秒)
|
||||||
|
global_user_lock_time = 300
|
||||||
|
|
||||||
|
#全局IP单位时间内最大尝试次数,0为关闭该功能
|
||||||
|
max_global_ip_ban_count = 40
|
||||||
|
#全局IP设置单位时间(秒)
|
||||||
|
global_ip_ban_reset_time = 1200
|
||||||
|
#全局IP锁定时间(秒)
|
||||||
|
global_ip_lock_time = 300
|
||||||
|
|
||||||
#客户端显示详细错误信息(线上环境慎开启)
|
#客户端显示详细错误信息(线上环境慎开启)
|
||||||
display_error = true
|
display_error = true
|
||||||
|
|
|
@ -3,6 +3,8 @@ package handler
|
||||||
import (
|
import (
|
||||||
"encoding/xml"
|
"encoding/xml"
|
||||||
"io"
|
"io"
|
||||||
|
"log"
|
||||||
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
|
@ -11,58 +13,31 @@ import (
|
||||||
"github.com/bjdgyc/anylink/base"
|
"github.com/bjdgyc/anylink/base"
|
||||||
)
|
)
|
||||||
|
|
||||||
// UserState 用于存储用户的登录状态
|
|
||||||
type UserState struct {
|
|
||||||
FailureCount int
|
|
||||||
LastAttempt time.Time
|
|
||||||
LockTime time.Time
|
|
||||||
}
|
|
||||||
|
|
||||||
// 自定义 contextKey 类型,避免键冲突
|
// 自定义 contextKey 类型,避免键冲突
|
||||||
type contextKey string
|
type contextKey string
|
||||||
|
|
||||||
// 定义常量作为上下文的键
|
// 定义常量作为上下文的键
|
||||||
const loginStatusKey contextKey = "login_status"
|
const loginStatusKey contextKey = "login_status"
|
||||||
|
|
||||||
// 用户状态映射
|
|
||||||
var userStates = make(map[string]*UserState)
|
|
||||||
var mu sync.Mutex
|
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
go cleanupUserStates()
|
lockManager.startCleanupTicker()
|
||||||
}
|
|
||||||
|
|
||||||
// 清理过期的登录状态
|
|
||||||
func cleanupUserStates() {
|
|
||||||
ticker := time.NewTicker(1 * time.Minute)
|
|
||||||
defer ticker.Stop()
|
|
||||||
|
|
||||||
for range ticker.C {
|
|
||||||
mu.Lock()
|
|
||||||
now := time.Now()
|
|
||||||
for username, state := range userStates {
|
|
||||||
if now.Sub(state.LastAttempt) > time.Duration(base.Cfg.UserStateExpiration)*time.Second {
|
|
||||||
delete(userStates, username)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
mu.Unlock()
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// 防爆破中间件
|
// 防爆破中间件
|
||||||
func antiBruteForce(next http.Handler) http.Handler {
|
func antiBruteForce(next http.Handler) http.Handler {
|
||||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
// 如果最大验证失败次数为0,则不启用防爆破功能
|
// 防爆破功能全局开关
|
||||||
if base.Cfg.MaxBanCount == 0 {
|
if !base.Cfg.AntiBruteForce {
|
||||||
next.ServeHTTP(w, r)
|
next.ServeHTTP(w, r)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
body, err := io.ReadAll(r.Body)
|
body, err := io.ReadAll(r.Body)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
http.Error(w, "Failed to read request body", http.StatusBadRequest)
|
http.Error(w, "Failed to read request body", http.StatusBadRequest)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
r.Body.Close()
|
defer r.Body.Close()
|
||||||
|
|
||||||
cr := ClientRequest{}
|
cr := ClientRequest{}
|
||||||
err = xml.Unmarshal(body, &cr)
|
err = xml.Unmarshal(body, &cr)
|
||||||
|
@ -72,35 +47,49 @@ func antiBruteForce(next http.Handler) http.Handler {
|
||||||
}
|
}
|
||||||
|
|
||||||
username := cr.Auth.Username
|
username := cr.Auth.Username
|
||||||
|
ip, _, err := net.SplitHostPort(r.RemoteAddr) // 提取纯 IP 地址,去掉端口号
|
||||||
// 更新用户登录状态
|
if err != nil {
|
||||||
mu.Lock()
|
http.Error(w, "Unable to parse IP address", http.StatusInternalServerError)
|
||||||
state, exists := userStates[username]
|
return
|
||||||
if !exists {
|
|
||||||
state = &UserState{}
|
|
||||||
userStates[username] = state
|
|
||||||
}
|
|
||||||
// 检查是否已超过锁定时间
|
|
||||||
if !state.LockTime.IsZero() {
|
|
||||||
if time.Now().After(state.LockTime) {
|
|
||||||
// 如果已经超过了锁定时间,重置失败计数和锁定时间
|
|
||||||
state.FailureCount = 0
|
|
||||||
state.LockTime = time.Time{}
|
|
||||||
} else {
|
|
||||||
// 如果还在锁定时间内,返回错误信息
|
|
||||||
http.Error(w, "Account locked due to too many failed attempts. Try again later.", http.StatusTooManyRequests)
|
|
||||||
mu.Unlock()
|
|
||||||
return
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// 如果超过时间窗口,重置失败计数
|
now := time.Now()
|
||||||
if time.Since(state.LastAttempt) > time.Duration(base.Cfg.BanResetTime)*time.Second {
|
|
||||||
state.FailureCount = 0
|
// // 速率限制
|
||||||
|
// lockManager.mu.RLock()
|
||||||
|
// limiter, exists := lockManager.rateLimiter[ip]
|
||||||
|
// if !exists {
|
||||||
|
// limiter = rate.NewLimiter(rate.Limit(base.Cfg.RateLimit), base.Cfg.Burst)
|
||||||
|
// lockManager.rateLimiter[ip] = limiter
|
||||||
|
// }
|
||||||
|
// lockManager.mu.RUnlock()
|
||||||
|
|
||||||
|
// if !limiter.Allow() {
|
||||||
|
// log.Printf("Rate limit exceeded for IP %s. Try again later.", ip)
|
||||||
|
// http.Error(w, "Rate limit exceeded. Try again later.", http.StatusTooManyRequests)
|
||||||
|
// return
|
||||||
|
// }
|
||||||
|
|
||||||
|
// 检查全局 IP 锁定
|
||||||
|
if base.Cfg.MaxGlobalIPBanCount > 0 && lockManager.checkGlobalIPLock(ip, now) {
|
||||||
|
log.Printf("IP %s is globally locked. Try again later.", ip)
|
||||||
|
http.Error(w, "Account globally locked due to too many failed attempts. Try again later.", http.StatusTooManyRequests)
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
state.LastAttempt = time.Now()
|
// 检查全局用户锁定
|
||||||
mu.Unlock()
|
if base.Cfg.MaxGlobalUserBanCount > 0 && lockManager.checkGlobalUserLock(username, now) {
|
||||||
|
log.Printf("User %s is globally locked. Try again later.", username)
|
||||||
|
http.Error(w, "Account globally locked due to too many failed attempts. Try again later.", http.StatusTooManyRequests)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// 检查单个用户的 IP 锁定
|
||||||
|
if base.Cfg.MaxBanCount > 0 && lockManager.checkUserIPLock(username, ip, now) {
|
||||||
|
log.Printf("IP %s is locked for user %s. Try again later.", ip, username)
|
||||||
|
http.Error(w, "Account locked due to too many failed attempts. Try again later.", http.StatusTooManyRequests)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
// 重新设置请求体以便后续处理器可以访问
|
// 重新设置请求体以便后续处理器可以访问
|
||||||
r.Body = io.NopCloser(strings.NewReader(string(body)))
|
r.Body = io.NopCloser(strings.NewReader(string(body)))
|
||||||
|
@ -109,23 +98,256 @@ func antiBruteForce(next http.Handler) http.Handler {
|
||||||
next.ServeHTTP(w, r)
|
next.ServeHTTP(w, r)
|
||||||
|
|
||||||
// 从 context 中获取登录状态
|
// 从 context 中获取登录状态
|
||||||
loginStatus, ok := r.Context().Value(loginStatusKey).(bool)
|
loginStatus, _ := r.Context().Value(loginStatusKey).(bool)
|
||||||
if !ok {
|
|
||||||
// 如果没有找到登录状态,默认为登录失败
|
|
||||||
loginStatus = false
|
|
||||||
}
|
|
||||||
|
|
||||||
// 更新用户登录状态
|
// 更新用户登录状态
|
||||||
mu.Lock()
|
lockManager.updateGlobalIPLock(ip, now, loginStatus)
|
||||||
defer mu.Unlock()
|
lockManager.updateGlobalUserLock(username, now, loginStatus)
|
||||||
|
lockManager.updateUserIPLock(username, ip, now, loginStatus)
|
||||||
if !loginStatus {
|
|
||||||
state.FailureCount++
|
|
||||||
if state.FailureCount >= base.Cfg.MaxBanCount {
|
|
||||||
state.LockTime = time.Now().Add(time.Duration(base.Cfg.LockTime) * time.Second)
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
state.FailureCount = 0 // 成功登录后重置
|
|
||||||
}
|
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type LockState struct {
|
||||||
|
FailureCount int
|
||||||
|
LockTime time.Time
|
||||||
|
LastAttempt time.Time
|
||||||
|
}
|
||||||
|
|
||||||
|
type LockManager struct {
|
||||||
|
mu sync.RWMutex
|
||||||
|
ipLocks map[string]*LockState // 全局IP锁定状态
|
||||||
|
userLocks map[string]*LockState // 全局用户锁定状态
|
||||||
|
ipUserLocks map[string]map[string]*LockState // 单用户IP锁定状态
|
||||||
|
// rateLimiter map[string]*rate.Limiter // 速率限制器
|
||||||
|
cleanupTicker *time.Ticker
|
||||||
|
}
|
||||||
|
|
||||||
|
var lockManager = &LockManager{
|
||||||
|
ipLocks: make(map[string]*LockState),
|
||||||
|
userLocks: make(map[string]*LockState),
|
||||||
|
ipUserLocks: make(map[string]map[string]*LockState),
|
||||||
|
// rateLimiter: make(map[string]*rate.Limiter),
|
||||||
|
}
|
||||||
|
|
||||||
|
func (lm *LockManager) startCleanupTicker() {
|
||||||
|
lm.cleanupTicker = time.NewTicker(1 * time.Minute)
|
||||||
|
go func() {
|
||||||
|
for range lm.cleanupTicker.C {
|
||||||
|
lm.cleanupExpiredLocks()
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
// 定期清理过期的锁定
|
||||||
|
func (lm *LockManager) cleanupExpiredLocks() {
|
||||||
|
go func() {
|
||||||
|
for range time.Tick(5 * time.Minute) {
|
||||||
|
now := time.Now()
|
||||||
|
|
||||||
|
var ipKeys, userKeys []string
|
||||||
|
var IPuserKeys []struct{ user, ip string }
|
||||||
|
|
||||||
|
lm.mu.Lock()
|
||||||
|
for ip, state := range lm.ipLocks {
|
||||||
|
if now.Sub(state.LastAttempt) > time.Duration(base.Cfg.GlobalIPBanResetTime)*time.Second {
|
||||||
|
ipKeys = append(ipKeys, ip)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for user, state := range lm.userLocks {
|
||||||
|
if now.Sub(state.LastAttempt) > time.Duration(base.Cfg.GlobalUserBanResetTime)*time.Second {
|
||||||
|
userKeys = append(userKeys, user)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for user, ipMap := range lm.ipUserLocks {
|
||||||
|
for ip, state := range ipMap {
|
||||||
|
if now.Sub(state.LastAttempt) > time.Duration(base.Cfg.BanResetTime)*time.Second {
|
||||||
|
IPuserKeys = append(IPuserKeys, struct{ user, ip string }{user, ip})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
lm.mu.Unlock()
|
||||||
|
|
||||||
|
lm.mu.Lock()
|
||||||
|
for _, ip := range ipKeys {
|
||||||
|
delete(lm.ipLocks, ip)
|
||||||
|
}
|
||||||
|
for _, user := range userKeys {
|
||||||
|
delete(lm.userLocks, user)
|
||||||
|
}
|
||||||
|
for _, key := range IPuserKeys {
|
||||||
|
delete(lm.ipUserLocks[key.user], key.ip)
|
||||||
|
if len(lm.ipUserLocks[key.user]) == 0 {
|
||||||
|
delete(lm.ipUserLocks, key.user)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
lm.mu.Unlock()
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
// 检查全局 IP 锁定
|
||||||
|
func (lm *LockManager) checkGlobalIPLock(ip string, now time.Time) bool {
|
||||||
|
lm.mu.RLock()
|
||||||
|
defer lm.mu.RUnlock()
|
||||||
|
|
||||||
|
state, exists := lm.ipLocks[ip]
|
||||||
|
if !exists {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
if !state.LockTime.IsZero() && now.Before(state.LockTime) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// 如果超过时间窗口,重置失败计数
|
||||||
|
if now.Sub(state.LastAttempt) > time.Duration(base.Cfg.GlobalIPBanResetTime)*time.Second {
|
||||||
|
state.FailureCount = 0
|
||||||
|
state.LockTime = time.Time{}
|
||||||
|
}
|
||||||
|
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// 检查全局用户锁定
|
||||||
|
func (lm *LockManager) checkGlobalUserLock(username string, now time.Time) bool {
|
||||||
|
// 我也不知道为什么cisco anyconnect每次连接会先传一个空用户请求····
|
||||||
|
if username == "" {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
lm.mu.RLock()
|
||||||
|
defer lm.mu.RUnlock()
|
||||||
|
|
||||||
|
state, exists := lm.userLocks[username]
|
||||||
|
if !exists {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
if !state.LockTime.IsZero() && now.Before(state.LockTime) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// 如果超过时间窗口,重置失败计数
|
||||||
|
if now.Sub(state.LastAttempt) > time.Duration(base.Cfg.GlobalUserBanResetTime)*time.Second {
|
||||||
|
state.FailureCount = 0
|
||||||
|
state.LockTime = time.Time{}
|
||||||
|
}
|
||||||
|
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// 检查单个用户的 IP 锁定
|
||||||
|
func (lm *LockManager) checkUserIPLock(username, ip string, now time.Time) bool {
|
||||||
|
// 我也不知道为什么cisco anyconnect每次连接会先传一个空用户请求····
|
||||||
|
if username == "" {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
lm.mu.RLock()
|
||||||
|
defer lm.mu.RUnlock()
|
||||||
|
|
||||||
|
userIPMap, userExists := lm.ipUserLocks[username]
|
||||||
|
if !userExists {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
state, ipExists := userIPMap[ip]
|
||||||
|
if !ipExists {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
if !state.LockTime.IsZero() && now.Before(state.LockTime) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// 如果超过时间窗口,重置失败计数
|
||||||
|
if now.Sub(state.LastAttempt) > time.Duration(base.Cfg.BanResetTime)*time.Second {
|
||||||
|
state.FailureCount = 0
|
||||||
|
state.LockTime = time.Time{}
|
||||||
|
}
|
||||||
|
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// 更新全局 IP 锁定状态
|
||||||
|
func (lm *LockManager) updateGlobalIPLock(ip string, now time.Time, success bool) {
|
||||||
|
lm.mu.Lock()
|
||||||
|
defer lm.mu.Unlock()
|
||||||
|
|
||||||
|
state, exists := lm.ipLocks[ip]
|
||||||
|
if !exists {
|
||||||
|
state = &LockState{}
|
||||||
|
lm.ipLocks[ip] = state
|
||||||
|
}
|
||||||
|
|
||||||
|
if success {
|
||||||
|
state.FailureCount = 0
|
||||||
|
state.LockTime = time.Time{}
|
||||||
|
} else {
|
||||||
|
state.FailureCount++
|
||||||
|
if state.FailureCount >= base.Cfg.MaxGlobalIPBanCount {
|
||||||
|
state.LockTime = now.Add(time.Duration(base.Cfg.GlobalIPLockTime) * time.Second)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
state.LastAttempt = now
|
||||||
|
}
|
||||||
|
|
||||||
|
// 更新全局用户锁定状态
|
||||||
|
func (lm *LockManager) updateGlobalUserLock(username string, now time.Time, success bool) {
|
||||||
|
// 我也不知道为什么cisco anyconnect每次连接会先传一个空用户请求····
|
||||||
|
if username == "" {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
lm.mu.Lock()
|
||||||
|
defer lm.mu.Unlock()
|
||||||
|
|
||||||
|
state, exists := lm.userLocks[username]
|
||||||
|
if !exists {
|
||||||
|
state = &LockState{}
|
||||||
|
lm.userLocks[username] = state
|
||||||
|
}
|
||||||
|
|
||||||
|
if success {
|
||||||
|
state.FailureCount = 0
|
||||||
|
state.LockTime = time.Time{}
|
||||||
|
} else {
|
||||||
|
state.FailureCount++
|
||||||
|
if state.FailureCount >= base.Cfg.MaxGlobalUserBanCount {
|
||||||
|
state.LockTime = now.Add(time.Duration(base.Cfg.GlobalUserLockTime) * time.Second)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
state.LastAttempt = now
|
||||||
|
}
|
||||||
|
|
||||||
|
// 更新单个用户的 IP 锁定状态
|
||||||
|
func (lm *LockManager) updateUserIPLock(username, ip string, now time.Time, success bool) {
|
||||||
|
// 我也不知道为什么cisco anyconnect每次连接会先传一个空用户请求····
|
||||||
|
if username == "" {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
lm.mu.Lock()
|
||||||
|
defer lm.mu.Unlock()
|
||||||
|
|
||||||
|
userIPMap, userExists := lm.ipUserLocks[username]
|
||||||
|
if !userExists {
|
||||||
|
userIPMap = make(map[string]*LockState)
|
||||||
|
lm.ipUserLocks[username] = userIPMap
|
||||||
|
}
|
||||||
|
|
||||||
|
state, ipExists := userIPMap[ip]
|
||||||
|
if !ipExists {
|
||||||
|
state = &LockState{}
|
||||||
|
userIPMap[ip] = state
|
||||||
|
}
|
||||||
|
|
||||||
|
if success {
|
||||||
|
state.FailureCount = 0
|
||||||
|
state.LockTime = time.Time{}
|
||||||
|
} else {
|
||||||
|
state.FailureCount++
|
||||||
|
if state.FailureCount >= base.Cfg.MaxBanCount {
|
||||||
|
state.LockTime = now.Add(time.Duration(base.Cfg.LockTime) * time.Second)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
state.LastAttempt = now
|
||||||
|
}
|
||||||
|
|
Loading…
Reference in New Issue