custom_handler = boolval(get_config('system', 'session_custom', false)); /* * Set our session storage functions. */ if($this->custom_handler) { /* Custom handler (files, memached, redis..) */ $session_save_handler = strval(get_config('system', 'session_save_handler', Null)); $session_save_path = strval(get_config('system', 'session_save_path', Null)); $session_gc_probability = intval(get_config('system', 'session_gc_probability', 1)); $session_gc_divisor = intval(get_config('system', 'session_gc_divisor', 100)); if(!$session_save_handler || !$session_save_path) { logger('Session save handler or path not set.',LOGGER_NORMAL,LOG_ERR); } else { ini_set('session.save_handler', $session_save_handler); ini_set('session.save_path', $session_save_path); ini_set('session.gc_probability', $session_gc_probability); ini_set('session.gc_divisor', $session_gc_divisor); } } else { $handler = new \Zotlabs\Web\SessionHandler(); $this->handler = $handler; $x = session_set_save_handler($handler,false); if(! $x) logger('Session save handler initialisation failed.',LOGGER_NORMAL,LOG_ERR); } // Force cookies to be secure (https only) if this site is SSL enabled. // Must be done before session_start(). $arr = session_get_cookie_params(); // Note when setting cookies: set the domain to false which creates a single domain // cookie. If you use a hostname it will create a .domain.com wildcard which will // have some nasty side effects if you have any other subdomains running hubzilla. session_set_cookie_params( ((isset($arr['lifetime'])) ? $arr['lifetime'] : 0), ((isset($arr['path'])) ? $arr['path'] : '/'), (($arr['domain']) ? $arr['domain'] : false), ((isset($_SERVER['HTTPS']) && strtolower($_SERVER['HTTPS']) == 'on') ? true : false), ((isset($arr['httponly'])) ? $arr['httponly'] : true) ); register_shutdown_function('session_write_close'); } public function start() { session_start(); $this->session_started = true; } /** * @brief Resets the current session. * * @return void */ public function nuke() { $this->new_cookie(0); // 0 means delete on browser exit if($_SESSION && count($_SESSION)) { foreach($_SESSION as $k => $v) { unset($_SESSION[$k]); } } } public function new_cookie($xtime) { $newxtime = (($xtime> 0) ? (time() + $xtime) : 0); $old_sid = session_id(); $arr = session_get_cookie_params(); if(($this->handler || $this->custom_handler) && $this->session_started) { session_regenerate_id(true); // force SessionHandler record creation with the new session_id // which occurs as a side effect of read() if (! $this->custom_handler) { $this->handler->read(session_id()); } } else logger('no session handler'); if (x($_COOKIE, 'jsdisabled')) { setcookie('jsdisabled', $_COOKIE['jsdisabled'], $newxtime, '/', false,((isset($_SERVER['HTTPS']) && strtolower($_SERVER['HTTPS']) == 'on') ? true : false),((isset($arr['httponly'])) ? $arr['httponly'] : true)); } setcookie(session_name(),session_id(),$newxtime, '/', false,((isset($_SERVER['HTTPS']) && strtolower($_SERVER['HTTPS']) == 'on') ? true : false),((isset($arr['httponly'])) ? $arr['httponly'] : true)); $arr = array('expire' => $xtime); call_hooks('new_cookie', $arr); } public function extend_cookie() { $arr = session_get_cookie_params(); // if there's a long-term cookie, extend it $xtime = (($_SESSION['remember_me']) ? (60 * 60 * 24 * 365) : 0 ); if($xtime) setcookie(session_name(),session_id(),(time() + $xtime), '/', false,((isset($_SERVER['HTTPS']) && strtolower($_SERVER['HTTPS']) == 'on') ? true : false),((isset($arr['httponly'])) ? $arr['httponly'] : true)); $arr = array('expire' => $xtime); call_hooks('extend_cookie', $arr); } public function return_check() { // check a returning visitor against IP changes. // If the change results in being blocked from re-entry with the current cookie // nuke the session and logout. // Returning at all indicates the session is still valid. // first check if we're enforcing that sessions can't change IP address // @todo what to do with IPv6 addresses if($_SESSION['addr'] && $_SESSION['addr'] != $_SERVER['REMOTE_ADDR']) { logger('SECURITY: Session IP address changed: ' . $_SESSION['addr'] . ' != ' . $_SERVER['REMOTE_ADDR']); $partial1 = substr($_SESSION['addr'], 0, strrpos($_SESSION['addr'], '.')); $partial2 = substr($_SERVER['REMOTE_ADDR'], 0, strrpos($_SERVER['REMOTE_ADDR'], '.')); $paranoia = intval(get_pconfig($_SESSION['uid'], 'system', 'paranoia')); if(! $paranoia) $paranoia = intval(get_config('system', 'paranoia')); switch($paranoia) { case 0: // no IP checking break; case 2: // check 2 octets $partial1 = substr($partial1, 0, strrpos($partial1, '.')); $partial2 = substr($partial2, 0, strrpos($partial2, '.')); if($partial1 == $partial2) break; case 1: // check 3 octets if($partial1 == $partial2) break; case 3: default: // check any difference at all logger('Session address changed. Paranoid setting in effect, blocking session. ' . $_SESSION['addr'] . ' != ' . $_SERVER['REMOTE_ADDR']); $this->nuke(); goaway(z_root()); break; } } return true; } }