You are here

honeypot.module in Honeypot 7

Same filename and directory in other branches
  1. 8 honeypot.module
  2. 6 honeypot.module
  3. 2.0.x honeypot.module

Honeypot module, for deterring spam bots from completing Drupal forms.

File

honeypot.module
View source
<?php

/**
 * @file
 * Honeypot module, for deterring spam bots from completing Drupal forms.
 */

/**
 * Implements hook_menu().
 */
function honeypot_menu() {
  $items['admin/config/content/honeypot'] = array(
    'title' => 'Honeypot configuration',
    'description' => 'Configure Honeypot spam prevention and the forms on which Honeypot will be used.',
    'page callback' => 'drupal_get_form',
    'page arguments' => array(
      'honeypot_admin_form',
    ),
    'access arguments' => array(
      'administer honeypot',
    ),
    'file' => 'honeypot.admin.inc',
  );
  return $items;
}

/**
 * Implements hook_permission().
 */
function honeypot_permission() {
  return array(
    'administer honeypot' => array(
      'title' => t('Administer Honeypot'),
      'description' => t('Administer Honeypot-protected forms and settings'),
    ),
    'bypass honeypot protection' => array(
      'title' => t('Bypass Honeypot protection'),
      'description' => t('Bypass Honeypot form protection.'),
    ),
  );
}

/**
 * Implements hook_cron().
 */
function honeypot_cron() {

  // Delete {honeypot_user} entries older than the value of honeypot_expire.
  db_delete('honeypot_user')
    ->condition('timestamp', REQUEST_TIME - variable_get('honeypot_expire', 300), '<')
    ->execute();

  // Regenerate the honeypot css file if it does not exist or is outdated.
  $honeypot_css = honeypot_get_css_file_path();
  $honeypot_element_name = variable_get('honeypot_element_name', 'url');
  if (!file_exists($honeypot_css) || !honeypot_check_css($honeypot_element_name)) {
    honeypot_create_css($honeypot_element_name);
  }
}

/**
 * Implements hook_form_alter().
 *
 * Add Honeypot features to forms enabled in the Honeypot admin interface.
 */
function honeypot_form_alter(&$form, &$form_state, $form_id) {

  // Don't use for maintenance mode forms (install, update, etc.).
  if (defined('MAINTENANCE_MODE')) {
    return;
  }
  $unprotected_forms = array(
    'user_login',
    'user_login_block',
    'search_form',
    'search_block_form',
    'views_exposed_form',
    'honeypot_admin_form',
  );

  // If configured to protect all forms, add protection to every form.
  if (variable_get('honeypot_protect_all_forms', 0) && !in_array($form_id, $unprotected_forms)) {

    // Don't protect system forms - only admins should have access, and system
    // forms may be programmatically submitted by drush and other modules.
    if (preg_match('/[^a-zA-Z]system_/', $form_id) === 0 && preg_match('/[^a-zA-Z]search_/', $form_id) === 0 && preg_match('/[^a-zA-Z]views_exposed_form_/', $form_id) === 0) {
      honeypot_add_form_protection($form, $form_state, array(
        'honeypot',
        'time_restriction',
      ));
    }
  }
  elseif ($forms_to_protect = honeypot_get_protected_forms()) {
    foreach ($forms_to_protect as $protect_form_id) {

      // For most forms, do a straight check on the form ID.
      if ($form_id == $protect_form_id) {
        honeypot_add_form_protection($form, $form_state, array(
          'honeypot',
          'time_restriction',
        ));
      }
      elseif ($protect_form_id == 'webforms' && strpos($form_id, 'webform_client_form') !== FALSE) {
        honeypot_add_form_protection($form, $form_state, array(
          'honeypot',
          'time_restriction',
        ));
      }
    }
  }
}

/**
 * Implements hook_trigger_info().
 */
function honeypot_trigger_info() {
  return array(
    'honeypot' => array(
      'honeypot_reject' => array(
        'label' => t('Honeypot rejection'),
      ),
    ),
  );
}

/**
 * Implements hook_rules_event_info().
 */
function honeypot_rules_event_info() {
  return array(
    'honeypot_reject' => array(
      'label' => t('Honeypot rejection'),
      'group' => t('Honeypot'),
      'variables' => array(
        'form_id' => array(
          'type' => 'text',
          'label' => t('Form ID of the form the user was disallowed from submitting.'),
        ),
        // Don't provide 'uid' in context because it is available as
        // site:current-user:uid.
        'type' => array(
          'type' => 'text',
          'label' => t('String indicating the reason the submission was blocked.'),
        ),
      ),
    ),
  );
}

/**
 * Implements hook_library().
 */
function honeypot_library() {
  $info = system_get_info('module', 'honeypot');
  $version = $info['version'];

  // Library for Honeypot JS.
  $libraries['timestamp.js'] = array(
    'title' => 'Javascript to support timelimit on cached pages.',
    'version' => $version,
    'js' => array(
      array(
        'type' => 'setting',
        'data' => array(
          'honeypot' => array(
            'jsToken' => honeypot_get_signed_timestamp('js_token:' . mt_rand(0, 2147483647)),
          ),
        ),
      ),
      drupal_get_path('module', 'honeypot') . '/js/honeypot.js' => array(
        'group' => JS_LIBRARY,
        'weight' => 3,
      ),
    ),
  );
  return $libraries;
}

/**
 * Build an array of all the protected forms on the site, by form_id.
 *
 * @todo - Add in API call/hook to allow modules to add to this array.
 */
function honeypot_get_protected_forms() {
  $forms =& drupal_static(__FUNCTION__);

  // If the data isn't already in memory, get from cache or look it up fresh.
  if (!isset($forms)) {
    if ($cache = cache_get('honeypot_protected_forms')) {
      $forms = $cache->data;
    }
    else {
      $forms = array();

      // Look up all the honeypot forms in the variables table.
      $result = db_query("SELECT name FROM {variable} WHERE name LIKE 'honeypot_form_%'")
        ->fetchCol();

      // Add each form that's enabled to the $forms array.
      foreach ($result as $variable) {
        if (variable_get($variable, 0)) {
          $forms[] = substr($variable, 14);
        }
      }

      // Save the cached data.
      cache_set('honeypot_protected_forms', $forms, 'cache');
    }
  }
  return $forms;
}

/**
 * Form builder function to add different types of protection to forms.
 *
 * @param array $options
 *   Array of options to be added to form. Currently accepts 'honeypot' and
 *   'time_restriction'.
 *
 * @return array
 *   Returns elements to be placed in a form's elements array to prevent spam.
 */
function honeypot_add_form_protection(&$form, &$form_state, $options = array()) {
  global $user;

  // Allow other modules to alter the protections applied to this form.
  drupal_alter('honeypot_form_protections', $options, $form);

  // Don't add any protections if the user can bypass the Honeypot.
  if (user_access('bypass honeypot protection')) {
    return;
  }

  // Build the honeypot element.
  if (in_array('honeypot', $options)) {

    // Get the element name (default is generic 'url').
    $honeypot_element = variable_get('honeypot_element_name', 'url');

    // Add 'autocomplete="off"' if configured.
    $attributes = array();
    if (variable_get('honeypot_autocomplete_attribute', 1)) {
      $attributes = array(
        'autocomplete' => 'off',
      );
    }

    // Get the path to the honeypot css file.
    $honeypot_css = honeypot_get_css_file_path();

    // Build the honeypot element.
    $honeypot_class = $honeypot_element . '-textfield';
    $form[$honeypot_element] = array(
      '#type' => 'textfield',
      '#title' => t('Leave this field blank'),
      '#size' => 20,
      '#weight' => 100,
      '#attributes' => $attributes,
      '#element_validate' => array(
        '_honeypot_honeypot_validate',
      ),
      '#prefix' => '<div class="' . $honeypot_class . '">',
      '#suffix' => '</div>',
      // Hide honeypot using CSS.
      '#attached' => array(
        'css' => array(
          'data' => $honeypot_css,
        ),
      ),
    );
  }

  // Build the time restriction element (if it's not disabled).
  if (in_array('time_restriction', $options) && variable_get('honeypot_time_limit', 5) != 0) {

    // Set the current time in a hidden value to be checked later.
    $form['honeypot_time'] = array(
      '#type' => 'hidden',
      '#title' => t('Timestamp'),
      '#default_value' => honeypot_get_signed_timestamp(REQUEST_TIME),
      '#element_validate' => array(
        '_honeypot_time_restriction_validate',
      ),
    );

    // Disable page caching to make sure timestamp isn't cached.
    if (user_is_anonymous() && drupal_page_is_cacheable()) {

      // Use javascript implementation if this page should be cached.
      if (variable_get('honeypot_use_js_for_cached_pages', FALSE)) {
        $form['honeypot_time']['#default_value'] = 'no_js_available';
        $form['honeypot_time']['#attached']['library'][] = array(
          'honeypot',
          'timestamp.js',
        );
        $form['#attributes']['class'][] = 'honeypot-timestamp-js';
      }
      else {
        drupal_page_is_cacheable(FALSE);
      }
    }
  }

  // Allow other modules to react to addition of form protection.
  if (!empty($options)) {
    module_invoke_all('honeypot_add_form_protection', $options, $form);
  }
}

/**
 * Validate honeypot field.
 */
function _honeypot_honeypot_validate($element, &$form_state) {

  // Get the honeypot field value.
  $honeypot_value = $element['#value'];

  // Make sure it's empty.
  if (!empty($honeypot_value) || $honeypot_value == '0') {
    _honeypot_log($form_state['values']['form_id'], 'honeypot');
    form_set_error('', t('There was a problem with your form submission. Please refresh the page and try again.'));
  }
}

/**
 * Validate honeypot's time restriction field.
 */
function _honeypot_time_restriction_validate(&$element, &$form_state) {
  if (!empty($form_state['programmed'])) {

    // Don't do anything if the form was submitted programmatically.
    return;
  }

  // Don't do anything if the triggering element is a preview button.
  if ($form_state['triggering_element']['#value'] == t('Preview')) {
    return;
  }
  if ($form_state['values']['honeypot_time'] == 'no_js_available') {

    // Set an error, but do not penalize the user as it might be a legitimate
    // attempt.
    form_set_error('', t('You seem to have javascript disabled. Please confirm your form submission.'));
    if (variable_get('honeypot_log', 0)) {
      $variables = array(
        '%form' => $form_state['values']['form_id'],
      );
      watchdog('honeypot', 'User tried to submit form %form without javascript enabled.', $variables);
    }

    // Update the value in $form_state and $element.
    $form_state['values']['honeypot_time'] = honeypot_get_signed_timestamp(REQUEST_TIME);
    $element['#value'] = $form_state['values']['honeypot_time'];
    return;
  }
  $honeypot_time = FALSE;

  // Update the honeypot_time for JS requests and get the $honeypot_time value.
  if (strpos($form_state['values']['honeypot_time'], 'js_token:') === 0) {
    $interval = _honeypot_get_interval_from_signed_js_value($form_state['values']['honeypot_time']);
    if ($interval) {

      // Set correct value for timestamp validation.
      $honeypot_time = REQUEST_TIME - $interval;

      // Update form_state and element values so they're correct.
      $form_state['values']['honeypot_time'] = honeypot_get_signed_timestamp($honeypot_time);
      $element['#value'] = $form_state['values']['honeypot_time'];
    }
  }
  else {

    // Get the time value.
    $honeypot_time = honeypot_get_time_from_signed_timestamp($form_state['values']['honeypot_time']);
  }

  // Get the honeypot_time_limit.
  $time_limit = honeypot_get_time_limit($form_state['values']);

  // Make sure current time - (time_limit + form time value) is greater than 0.
  // If not, throw an error.
  if (!$honeypot_time || REQUEST_TIME < $honeypot_time + $time_limit) {
    _honeypot_log($form_state['values']['form_id'], 'honeypot_time');

    // Get the time limit again, since it increases after first failure.
    $time_limit = honeypot_get_time_limit($form_state['values']);

    // Update the honeypot_time value in the form state and element.
    $form_state['values']['honeypot_time'] = honeypot_get_signed_timestamp(REQUEST_TIME);
    $element['#value'] = $form_state['values']['honeypot_time'];
    form_set_error('', t('There was a problem with your form submission. Please wait @limit seconds and try again.', array(
      '@limit' => $time_limit,
    )));
  }
}

/**
 * Returns an interval if the given javascript submitted value is valid.
 *
 * @param string $honeypot_time
 *   The signed interval as submitted via javascript.
 *
 * @return int|FALSE
 *   The interval in seconds if the token is valid, FALSE otherwise.
 */
function _honeypot_get_interval_from_signed_js_value($honeypot_time) {
  $t = explode('|', $honeypot_time);
  if (count($t) != 3) {
    return FALSE;
  }
  $js_token = $t[0] . '|' . $t[1];
  $token_check = honeypot_get_time_from_signed_timestamp($js_token);
  if (!$token_check) {
    return FALSE;
  }
  $interval = (int) $t[2];
  if ($interval == 0) {
    return FALSE;
  }
  return $interval;
}

/**
 * Log blocked form submissions.
 *
 * @param string $form_id
 *   Form ID for the form on which submission was blocked.
 * @param string $type
 *   String indicating the reason the submission was blocked. Allowed values:
 *     - honeypot: If honeypot field was filled in.
 *     - honeypot_time: If form was completed before the configured time limit.
 */
function _honeypot_log($form_id, $type) {
  honeypot_log_failure($form_id, $type);
  if (variable_get('honeypot_log', 0)) {
    $variables = array(
      '%form' => $form_id,
      '@cause' => $type == 'honeypot' ? t('submission of a value in the honeypot field') : t('submission of the form in less than minimum required time'),
    );
    watchdog('honeypot', 'Blocked submission of %form due to @cause.', $variables);
  }
}

/**
 * Look up the time limit for the current user.
 *
 * @param array $form_values
 *   Array of form values (optional).
 */
function honeypot_get_time_limit($form_values = array()) {
  global $user;
  $honeypot_time_limit = variable_get('honeypot_time_limit', 5);

  // Only calculate time limit if honeypot_time_limit has a value > 0.
  if ($honeypot_time_limit) {
    $expire_time = variable_get('honeypot_expire', 300);

    // Query the {honeypot_user} table to determine the number of failed
    // submissions for the current user.
    $query = db_select('honeypot_user', 'hs')
      ->condition('uid', $user->uid)
      ->condition('timestamp', REQUEST_TIME - $expire_time, '>');

    // For anonymous users, take the hostname into account.
    if ($user->uid === 0) {
      $query
        ->condition('hostname', ip_address());
    }
    $number = $query
      ->countQuery()
      ->execute()
      ->fetchField();

    // Don't add more time than the expiration window.
    $honeypot_time_limit = (int) min($honeypot_time_limit + exp($number) - 1, $expire_time);
    $additions = module_invoke_all('honeypot_time_limit', $honeypot_time_limit, $form_values, $number);
    if (count($additions)) {
      $honeypot_time_limit += array_sum($additions);
    }
  }
  return $honeypot_time_limit;
}

/**
 * Log the failed submision with timestamp and hostname.
 *
 * @param string $form_id
 *   Form ID for the rejected form submission.
 * @param string $type
 *   String indicating the reason the submission was blocked. Allowed values:
 *     - honeypot: If honeypot field was filled in.
 *     - honeypot_time: If form was completed before the configured time limit.
 */
function honeypot_log_failure($form_id, $type) {
  global $user;
  db_insert('honeypot_user')
    ->fields(array(
    'uid' => $user->uid,
    'hostname' => ip_address(),
    'timestamp' => REQUEST_TIME,
  ))
    ->execute();

  // Allow other modules to react to honeypot rejections.
  module_invoke_all('honeypot_reject', $form_id, $user->uid, $type);

  // Trigger honeypot_reject action.
  if (module_exists('trigger')) {
    $aids = trigger_get_assigned_actions('honeypot_reject');
    $context = array(
      'group' => 'honeypot',
      'hook' => 'honeypot_reject',
      'form_id' => $form_id,
      // Do not provide $user in context because it is available as a global.
      'type' => $type,
    );

    // Honeypot does not act on any specific object.
    $object = NULL;
    actions_do(array_keys($aids), $object, $context);
  }

  // Trigger rules honeypot_reject event.
  if (module_exists('rules')) {
    rules_invoke_event('honeypot_reject', $form_id, $type);
  }
}

/**
 * Retrieve the location of the Honeypot CSS file.
 *
 * @return string
 *   The path to the honeypot.css file.
 */
function honeypot_get_css_file_path() {
  return honeypot_file_default_scheme() . '://honeypot/honeypot.css';
}

/**
 * Create CSS file to hide the Honeypot field.
 *
 * @param string $element_name
 *   The honeypot element class name (e.g. 'url').
 */
function honeypot_create_css($element_name) {
  $path = honeypot_file_default_scheme() . '://honeypot';
  if (!file_prepare_directory($path, FILE_CREATE_DIRECTORY)) {
    drupal_set_message(t('Unable to create Honeypot CSS directory, %path. Check the permissions on your files directory.', array(
      '%path' => file_uri_target($path),
    )), 'error');
  }
  else {
    $filename = $path . '/honeypot.css';
    $data = '.' . $element_name . '-textfield { display: none !important; }';
    file_unmanaged_save_data($data, $filename, FILE_EXISTS_REPLACE);
  }
}

/**
 * Check Honeypot's CSS file for a given Honeypot element name.
 *
 * This function assumes the Honeypot CSS file already exists.
 *
 * @param string $element_name
 *   The honeypot element class name (e.g. 'url').
 *
 * @return bool
 *   TRUE if CSS is has element class name, FALSE if not.
 */
function honeypot_check_css($element_name) {
  $path = honeypot_get_css_file_path();
  $handle = fopen($path, 'r');
  $contents = fread($handle, filesize($path));
  fclose($handle);
  if (strpos($contents, $element_name) === 1) {
    return TRUE;
  }
  return FALSE;
}

/**
 * Sign the timestamp $time.
 *
 * @param mixed $time
 *   The timestamp to sign.
 *
 * @return string
 *   A signed timestamp in the form timestamp|HMAC.
 */
function honeypot_get_signed_timestamp($time) {
  return $time . '|' . drupal_hmac_base64($time, drupal_get_private_key());
}

/**
 * Validate a signed timestamp.
 *
 * @param string $signed_timestamp
 *   A timestamp concateneted with the signature
 *
 * @return int
 *   The timestamp if the signature is correct, 0 otherwise.
 */
function honeypot_get_time_from_signed_timestamp($signed_timestamp) {
  $honeypot_time = 0;

  // Fail fast if timestamp was forged or saved with an older Honeypot version.
  if (strpos($signed_timestamp, '|') === FALSE) {
    return $honeypot_time;
  }
  list($timestamp, $received_hmac) = explode('|', $signed_timestamp);
  if ($timestamp && $received_hmac) {
    $calculated_hmac = drupal_hmac_base64($timestamp, drupal_get_private_key());

    // Prevent leaking timing information, compare second order hmacs.
    $random_key = drupal_random_bytes(32);
    if (drupal_hmac_base64($calculated_hmac, $random_key) === drupal_hmac_base64($received_hmac, $random_key)) {
      $honeypot_time = $timestamp;
    }
  }
  return $honeypot_time;
}

/**
 * Gets the default file stream for honeypot.
 *
 * @return
 *   'public', 'private' or any other file scheme defined as the default.
 *
 * @see file_default_scheme()
 */
function honeypot_file_default_scheme() {
  return variable_get('honeypot_file_default_scheme', file_default_scheme());
}

Functions

Namesort descending Description
honeypot_add_form_protection Form builder function to add different types of protection to forms.
honeypot_check_css Check Honeypot's CSS file for a given Honeypot element name.
honeypot_create_css Create CSS file to hide the Honeypot field.
honeypot_cron Implements hook_cron().
honeypot_file_default_scheme Gets the default file stream for honeypot.
honeypot_form_alter Implements hook_form_alter().
honeypot_get_css_file_path Retrieve the location of the Honeypot CSS file.
honeypot_get_protected_forms Build an array of all the protected forms on the site, by form_id.
honeypot_get_signed_timestamp Sign the timestamp $time.
honeypot_get_time_from_signed_timestamp Validate a signed timestamp.
honeypot_get_time_limit Look up the time limit for the current user.
honeypot_library Implements hook_library().
honeypot_log_failure Log the failed submision with timestamp and hostname.
honeypot_menu Implements hook_menu().
honeypot_permission Implements hook_permission().
honeypot_rules_event_info Implements hook_rules_event_info().
honeypot_trigger_info Implements hook_trigger_info().
_honeypot_get_interval_from_signed_js_value Returns an interval if the given javascript submitted value is valid.
_honeypot_honeypot_validate Validate honeypot field.
_honeypot_log Log blocked form submissions.
_honeypot_time_restriction_validate Validate honeypot's time restriction field.