[drupal-devel] [feature] Ban hosts from the 'Top Visitors' page

Jaza drupal-devel at drupal.org
Mon Jun 6 02:30:11 UTC 2005


Issue status update for http://drupal.org/node/24135

 Project:      Drupal
 Version:      cvs
 Component:    user.module
 Category:     feature requests
 Priority:     normal
 Assigned to:  moshe weitzman
 Reported by:  moshe weitzman
 Updated by:   Jaza
 Status:       patch

This is a great start, but I think that this feature still needs
improvement before it's ready to be used by joe shmoe administrator.
The biggest danger that I foresee is administrators banning IPs that
they really shouldn't be banning. "Great, so you've banned the
aggressive bot from Kazakhstan, that put your throttle up to 3 when it
slammed your site last night. But you've also banned GoogleBot! Now
your site won't get indexed!"


There need to be mechanisms in place to stop this from happening.
Possibilities:


- IP lookup, so you can see the resolved hostname before banning the
host. Perhaps show the resolved hostname on the confirm dialog, e.g.
"Are you sure you want to ban the IP 64.68.82.14
(crawler10.googlebot.com)?"
- Automatic rather than (or as well as) manual banning. This might
create more problems than it solves, but in the long-term it's a better
solution. Perhaps something similar to the filtering mechanisms used by
the spam module?


But overall, +1 for this patch, as long as people know what they're
doing when they use it.




Jaza



Previous comments:
------------------------------------------------------------------------

June 2, 2005 - 15:54 : moshe weitzman

Attachment: http://drupal.org/files/issues/ban.diff (5.94 KB)

The intent of this patch is to provide an easy way to ban hosts that are
consuming too much bandwidth. Ideal for over-aggressive crawlers.




------------------------------------------------------------------------

June 2, 2005 - 15:59 : moshe weitzman

Attachment: http://drupal.org/files/issues/ban_0.diff (5.95 KB)

Oops. Here is the latest version.




------------------------------------------------------------------------

June 2, 2005 - 20:59 : Dries

Any particular reason we are not storing this in the database?  Storing
it in the database sounds like the better option to me.




------------------------------------------------------------------------

June 2, 2005 - 21:15 : moshe weitzman

well, we can't store it in the sessions table because many crawlers
don't persist cookies and thus get a new session for every request. so
we would have to store in a new table and I figured that I didn't need
to add a new query for every page view. it would be a fast query, so
perhaps a new table is OK. any more comments about variable table
versus new table?




------------------------------------------------------------------------

June 2, 2005 - 22:14 : breyten

Having a table would allow for a simple query like:


$result  = db_query("SELECT * FROM {banned_hosts} WHERE ipaddr = '%s'",
$_SERVER["REMOTE_ADDR"]);


which is probably faster than a combined in_array and array_keys I
suppose.




------------------------------------------------------------------------

June 3, 2005 - 22:02 : Dries

How about including this in the 'administer - access control - account
rules' page (?q=admin/access/rules).  We'd have to rephrase, and
possibly rework it a little to extend the e-mail and username rules
with IP/hostname rules but it sounds like a logical place to maintain
IP-bans.  In addition, we would be able to reuse the existing SQL
table.  (Let's not use variables!)  Thoughts?




------------------------------------------------------------------------

June 3, 2005 - 23:40 : breyten

Only a +1. It sounds very sensible :)




------------------------------------------------------------------------

June 6, 2005 - 08:18 : moshe weitzman

Attachment: http://drupal.org/files/issues/ban_1.diff (10.5 KB)

As suggested, this version integrates nicely into the admin/access/rules
pages. You are now able to ban hosts from statistics page or the access
rules page. I think there are use cases for both.


I moved renamed user_deny() tp drupal_deny() and moved it to
bootstrap.inc in order to let us block hosts during the bootstrap. We
check for a blocked host right after loading the database APi, which is
the earliest possible moment.


This feature makes it possible now to restrict your site to a few
approved IP addresses (or a range of addresses). Might be useful for
high security sites.







More information about the drupal-devel mailing list