195 lines
6.6 KiB
Go
195 lines
6.6 KiB
Go
package ratelimit
|
|
|
|
import (
|
|
"sync"
|
|
"time"
|
|
|
|
"gopkg.in/yaml.v2"
|
|
|
|
"github.com/letsencrypt/boulder/cmd"
|
|
)
|
|
|
|
// Limits is defined to allow mock implementations be provided during unit
|
|
// testing
|
|
type Limits interface {
|
|
TotalCertificates() RateLimitPolicy
|
|
CertificatesPerName() RateLimitPolicy
|
|
RegistrationsPerIP() RateLimitPolicy
|
|
RegistrationsPerIPRange() RateLimitPolicy
|
|
PendingAuthorizationsPerAccount() RateLimitPolicy
|
|
InvalidAuthorizationsPerAccount() RateLimitPolicy
|
|
CertificatesPerFQDNSet() RateLimitPolicy
|
|
LoadPolicies(contents []byte) error
|
|
}
|
|
|
|
// limitsImpl is an unexported implementation of the Limits interface. It acts
|
|
// as a container for a rateLimitConfig and a mutex. This allows the inner
|
|
// rateLimitConfig pointer to be updated safely when the overall configuration
|
|
// changes (e.g. due to a reload of the policy file)
|
|
type limitsImpl struct {
|
|
sync.RWMutex
|
|
rlPolicy *rateLimitConfig
|
|
}
|
|
|
|
func (r *limitsImpl) TotalCertificates() RateLimitPolicy {
|
|
r.RLock()
|
|
defer r.RUnlock()
|
|
if r.rlPolicy == nil {
|
|
return RateLimitPolicy{}
|
|
}
|
|
return r.rlPolicy.TotalCertificates
|
|
}
|
|
|
|
func (r *limitsImpl) CertificatesPerName() RateLimitPolicy {
|
|
r.RLock()
|
|
defer r.RUnlock()
|
|
if r.rlPolicy == nil {
|
|
return RateLimitPolicy{}
|
|
}
|
|
return r.rlPolicy.CertificatesPerName
|
|
}
|
|
|
|
func (r *limitsImpl) RegistrationsPerIP() RateLimitPolicy {
|
|
r.RLock()
|
|
defer r.RUnlock()
|
|
if r.rlPolicy == nil {
|
|
return RateLimitPolicy{}
|
|
}
|
|
return r.rlPolicy.RegistrationsPerIP
|
|
}
|
|
|
|
func (r *limitsImpl) RegistrationsPerIPRange() RateLimitPolicy {
|
|
r.RLock()
|
|
defer r.RUnlock()
|
|
if r.rlPolicy == nil {
|
|
return RateLimitPolicy{}
|
|
}
|
|
return r.rlPolicy.RegistrationsPerIPRange
|
|
}
|
|
|
|
func (r *limitsImpl) PendingAuthorizationsPerAccount() RateLimitPolicy {
|
|
r.RLock()
|
|
defer r.RUnlock()
|
|
if r.rlPolicy == nil {
|
|
return RateLimitPolicy{}
|
|
}
|
|
return r.rlPolicy.PendingAuthorizationsPerAccount
|
|
}
|
|
|
|
func (r *limitsImpl) InvalidAuthorizationsPerAccount() RateLimitPolicy {
|
|
r.RLock()
|
|
defer r.RUnlock()
|
|
if r.rlPolicy == nil {
|
|
return RateLimitPolicy{}
|
|
}
|
|
return r.rlPolicy.InvalidAuthorizationsPerAccount
|
|
}
|
|
|
|
func (r *limitsImpl) CertificatesPerFQDNSet() RateLimitPolicy {
|
|
r.RLock()
|
|
defer r.RUnlock()
|
|
if r.rlPolicy == nil {
|
|
return RateLimitPolicy{}
|
|
}
|
|
return r.rlPolicy.CertificatesPerFQDNSet
|
|
}
|
|
|
|
// LoadPolicies loads various rate limiting policies from a byte array of
|
|
// YAML configuration (typically read from disk by a reloader)
|
|
func (r *limitsImpl) LoadPolicies(contents []byte) error {
|
|
var newPolicy rateLimitConfig
|
|
err := yaml.Unmarshal(contents, &newPolicy)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
r.Lock()
|
|
r.rlPolicy = &newPolicy
|
|
r.Unlock()
|
|
return nil
|
|
}
|
|
|
|
func New() Limits {
|
|
return &limitsImpl{}
|
|
}
|
|
|
|
// rateLimitConfig contains all application layer rate limiting policies. It is
|
|
// unexported and clients are expected to use the exported container struct
|
|
type rateLimitConfig struct {
|
|
// Total number of certificates that can be extant at any given time.
|
|
// The 2160h window, 90 days, is chosen to match certificate lifetime, since the
|
|
// main capacity factor is how many OCSP requests we can sign with available
|
|
// hardware.
|
|
TotalCertificates RateLimitPolicy `yaml:"totalCertificates"`
|
|
// Number of certificates that can be extant containing any given name.
|
|
// These are counted by "base domain" aka eTLD+1, so any entries in the
|
|
// overrides section must be an eTLD+1 according to the publicsuffix package.
|
|
CertificatesPerName RateLimitPolicy `yaml:"certificatesPerName"`
|
|
// Number of registrations that can be created per IP.
|
|
// Note: Since this is checked before a registration is created, setting a
|
|
// RegistrationOverride on it has no effect.
|
|
RegistrationsPerIP RateLimitPolicy `yaml:"registrationsPerIP"`
|
|
// Number of registrations that can be created per fuzzy IP range. Unlike
|
|
// RegistrationsPerIP this will apply to a /48 for IPv6 addresses to help curb
|
|
// abuse from easily obtained IPv6 ranges.
|
|
// Note: Like RegistrationsPerIP, setting a RegistrationOverride has no
|
|
// effect here.
|
|
RegistrationsPerIPRange RateLimitPolicy `yaml:"registrationsPerIPRange"`
|
|
// Number of pending authorizations that can exist per account. Overrides by
|
|
// key are not applied, but overrides by registration are.
|
|
PendingAuthorizationsPerAccount RateLimitPolicy `yaml:"pendingAuthorizationsPerAccount"`
|
|
// Number of invalid authorizations that can be failed per account within the
|
|
// given window. Overrides by key are not applied, but overrides by registration are.
|
|
// Note that this limit is actually "per account, per hostname," but that
|
|
// is too long for the variable name.
|
|
InvalidAuthorizationsPerAccount RateLimitPolicy `yaml:"invalidAuthorizationsPerAccount"`
|
|
// Number of certificates that can be extant containing a specific set
|
|
// of DNS names.
|
|
CertificatesPerFQDNSet RateLimitPolicy `yaml:"certificatesPerFQDNSet"`
|
|
}
|
|
|
|
// RateLimitPolicy describes a general limiting policy
|
|
type RateLimitPolicy struct {
|
|
// How long to count items for
|
|
Window cmd.ConfigDuration `yaml:"window"`
|
|
// The max number of items that can be present before triggering the rate
|
|
// limit. Zero means "no limit."
|
|
Threshold int `yaml:"threshold"`
|
|
// A per-key override setting different limits than the default (higher or lower).
|
|
// The key is defined on a per-limit basis and should match the key it counts on.
|
|
// For instance, a rate limit on the number of certificates per name uses name as
|
|
// a key, while a rate limit on the number of registrations per IP subnet would
|
|
// use subnet as a key.
|
|
// Note that a zero entry in the overrides map does not mean "not limit," it
|
|
// means a limit of zero.
|
|
Overrides map[string]int `yaml:"overrides"`
|
|
// A per-registration override setting. This can be used, e.g. if there are
|
|
// hosting providers that we would like to grant a higher rate of issuance
|
|
// than the default. If both key-based and registration-based overrides are
|
|
// available, the registration-based on takes priority.
|
|
RegistrationOverrides map[int64]int `yaml:"registrationOverrides"`
|
|
}
|
|
|
|
// Enabled returns true iff the RateLimitPolicy is enabled.
|
|
func (rlp *RateLimitPolicy) Enabled() bool {
|
|
return rlp.Threshold != 0
|
|
}
|
|
|
|
// GetThreshold returns the threshold for this rate limit, taking into account
|
|
// any overrides for `key`.
|
|
func (rlp *RateLimitPolicy) GetThreshold(key string, regID int64) int {
|
|
if override, ok := rlp.RegistrationOverrides[regID]; ok {
|
|
return override
|
|
}
|
|
if override, ok := rlp.Overrides[key]; ok {
|
|
return override
|
|
}
|
|
return rlp.Threshold
|
|
}
|
|
|
|
// WindowBegin returns the time that a RateLimitPolicy's window begins, given a
|
|
// particular end time (typically the current time).
|
|
func (rlp *RateLimitPolicy) WindowBegin(windowEnd time.Time) time.Time {
|
|
return windowEnd.Add(-1 * rlp.Window.Duration)
|
|
}
|