/marauroa/src/marauroa/server/net/validator/ConnectionValidator.java

http://wastelanders.googlecode.com/ · Java · 216 lines · 86 code · 30 blank · 100 comment · 5 complexity · 30a582b29a5d48516b0562b2ed93a1ca MD5 · raw file

  1. /* $Id: ConnectionValidator.java,v 1.19 2009/08/01 19:06:45 nhnb Exp $ */
  2. /***************************************************************************
  3. * (C) Copyright 2003 - Marauroa *
  4. ***************************************************************************
  5. ***************************************************************************
  6. * *
  7. * This program is free software; you can redistribute it and/or modify *
  8. * it under the terms of the GNU General Public License as published by *
  9. * the Free Software Foundation; either version 2 of the License, or *
  10. * (at your option) any later version. *
  11. * *
  12. ***************************************************************************/
  13. package marauroa.server.net.validator;
  14. import marauroa.common.Log4J;
  15. import marauroa.server.game.db.BanListDAO;
  16. import marauroa.server.game.db.DAORegister;
  17. import java.net.InetAddress;
  18. import java.net.Socket;
  19. import java.nio.channels.SocketChannel;
  20. import java.sql.SQLException;
  21. import java.util.*;
  22. /**
  23. * The ConnectionValidator validates the ariving connections, currently it can
  24. * only check if the address is banned.
  25. * <p/>
  26. * There are two types of bans:
  27. * <ul>
  28. * <li>Permanent bans<br>
  29. * That are stored at database and that we offer no interface.
  30. * <li>Temportal bans<br>
  31. * That are not stored but that has a interface for adding, removing and
  32. * querying bans.
  33. * </ul>
  34. */
  35. public class ConnectionValidator implements Iterable<InetAddressMask> {
  36. /**
  37. * the logger instance.
  38. */
  39. private static final marauroa.common.Logger logger = Log4J.getLogger(ConnectionValidator.class);
  40. /**
  41. * Permanent bans are stored inside the database.
  42. */
  43. private List<InetAddressMask> permanentBans;
  44. /**
  45. * Temporal bans are added using the API and are lost on each server reset.
  46. * Consider using Database for a permanent ban
  47. */
  48. List<InetAddressMask> temporalBans;
  49. /**
  50. * A timer to remove ban when it is done.
  51. */
  52. private Timer timer;
  53. /* timestamp of last reload */
  54. private long lastLoadTS;
  55. /* How often do we reload ban information from database? Each 5 minutes */
  56. private final static long RELOAD_PERMANENT_BANS = 5 * 60 * 1000;
  57. /**
  58. * Constructor. It loads permanent bans from database.
  59. */
  60. public ConnectionValidator() {
  61. permanentBans = new LinkedList<InetAddressMask>();
  62. temporalBans = Collections.synchronizedList(new LinkedList<InetAddressMask>());
  63. /* read ban list from configuration */
  64. loadBannedIPNetworkListFromDB();
  65. timer = new Timer();
  66. }
  67. /**
  68. * Request connection validator to stop all the activity, and stop checking
  69. * if any ban needs to be removed.
  70. */
  71. public void finish() {
  72. timer.cancel();
  73. }
  74. /**
  75. * This class extend timer task to remove bans when the time is reached.
  76. *
  77. * @author miguel
  78. */
  79. private class RemoveBan extends TimerTask {
  80. private InetAddressMask mask;
  81. /**
  82. * Constructor
  83. *
  84. * @param mask
  85. */
  86. public RemoveBan(InetAddressMask mask) {
  87. this.mask = mask;
  88. }
  89. @Override
  90. public void run() {
  91. temporalBans.remove(mask);
  92. }
  93. }
  94. /**
  95. * Adds a ban just for this ip address for i seconds.
  96. *
  97. * @param channel the channel whose IP we are going to ban.
  98. * @param time how many seconds to ban.
  99. */
  100. public void addBan(SocketChannel channel, int time) {
  101. addBan(channel.socket().getInetAddress().getHostAddress(), "255.255.255.255", time);
  102. }
  103. /**
  104. * This adds a temporal ban.
  105. *
  106. * @param address the address to ban
  107. * @param mask mask to apply to the address
  108. * @param time how many seconds should the ban apply.
  109. */
  110. public void addBan(String address, String mask, long time) {
  111. InetAddressMask inetmask = new InetAddressMask(address, mask);
  112. timer.schedule(new RemoveBan(inetmask), time);
  113. temporalBans.add(inetmask);
  114. }
  115. /**
  116. * Removes one of the added temporal bans.
  117. *
  118. * @param address the address to remove
  119. * @param mask the mask used.
  120. * @return true if it has been removed.
  121. */
  122. public boolean removeBan(String address, String mask) {
  123. return temporalBans.remove(new InetAddressMask(address, mask));
  124. }
  125. /**
  126. * Returns an iterator over the temporal bans. To access permanent bans, use
  127. * database facility.
  128. */
  129. public Iterator<InetAddressMask> iterator() {
  130. return temporalBans.iterator();
  131. }
  132. /**
  133. * Is the source ip-address banned?
  134. *
  135. * @param address the InetAddress of the source
  136. * @return true if the source ip is banned
  137. */
  138. public synchronized boolean checkBanned(InetAddress address) {
  139. checkReload();
  140. for (InetAddressMask iam : temporalBans) {
  141. if (iam.matches(address)) {
  142. logger.debug("Address " + address + " is banned by " + iam);
  143. return true;
  144. }
  145. }
  146. for (InetAddressMask iam : permanentBans) {
  147. if (iam.matches(address)) {
  148. logger.debug("Address " + address + " is permanently banned by " + iam);
  149. return true;
  150. }
  151. }
  152. return false;
  153. }
  154. /**
  155. * Check if a socket that has a InetAddress associated is banned.
  156. *
  157. * @param socket the socket we want to check if it is banned or not.
  158. * @return true if it is banned.
  159. */
  160. public synchronized boolean checkBanned(Socket socket) {
  161. InetAddress address = socket.getInetAddress();
  162. return checkBanned(address);
  163. }
  164. /**
  165. * loads and initializes the ban list from a database
  166. */
  167. public synchronized void loadBannedIPNetworkListFromDB() {
  168. try {
  169. permanentBans.clear();
  170. permanentBans.addAll(DAORegister.get().get(BanListDAO.class).getBannedAddresses());
  171. } catch (SQLException sqle) {
  172. logger.error("cannot read banned networks database table", sqle);
  173. } catch (NullPointerException e) {
  174. logger.error("cannot read banned networks database table", e);
  175. }
  176. lastLoadTS = System.currentTimeMillis();
  177. }
  178. /**
  179. * checks if reload is necessary and performs it
  180. */
  181. public synchronized void checkReload() {
  182. if (System.currentTimeMillis() - lastLoadTS >= RELOAD_PERMANENT_BANS) {
  183. loadBannedIPNetworkListFromDB();
  184. }
  185. }
  186. }