2016-01-07 05:26:29 +01:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2014-09-03 10:43:11 +02:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
2020-06-05 11:47:20 +02:00
|
|
|
from typing import Dict
|
|
|
|
|
2014-09-02 19:00:15 +02:00
|
|
|
from ._base import Config
|
|
|
|
|
2014-10-30 12:10:17 +01:00
|
|
|
|
2020-09-04 12:54:56 +02:00
|
|
|
class RateLimitConfig:
|
2020-06-05 11:47:20 +02:00
|
|
|
def __init__(
|
|
|
|
self,
|
|
|
|
config: Dict[str, float],
|
|
|
|
defaults={"per_second": 0.17, "burst_count": 3.0},
|
|
|
|
):
|
2019-05-15 19:06:04 +02:00
|
|
|
self.per_second = config.get("per_second", defaults["per_second"])
|
2021-01-28 18:39:21 +01:00
|
|
|
self.burst_count = int(config.get("burst_count", defaults["burst_count"]))
|
2019-03-15 18:46:16 +01:00
|
|
|
|
|
|
|
|
2020-09-04 12:54:56 +02:00
|
|
|
class FederationRateLimitConfig:
|
2019-05-15 19:06:04 +02:00
|
|
|
_items_and_default = {
|
2019-07-05 12:10:19 +02:00
|
|
|
"window_size": 1000,
|
2019-05-15 19:06:04 +02:00
|
|
|
"sleep_limit": 10,
|
|
|
|
"sleep_delay": 500,
|
|
|
|
"reject_limit": 50,
|
|
|
|
"concurrent": 3,
|
|
|
|
}
|
|
|
|
|
|
|
|
def __init__(self, **kwargs):
|
|
|
|
for i in self._items_and_default.keys():
|
|
|
|
setattr(self, i, kwargs.get(i) or self._items_and_default[i])
|
|
|
|
|
2014-09-02 19:00:15 +02:00
|
|
|
|
2019-05-15 19:06:04 +02:00
|
|
|
class RatelimitConfig(Config):
|
2019-10-10 10:39:35 +02:00
|
|
|
section = "ratelimiting"
|
|
|
|
|
2019-06-24 12:34:45 +02:00
|
|
|
def read_config(self, config, **kwargs):
|
2019-05-15 19:06:04 +02:00
|
|
|
|
|
|
|
# Load the new-style messages config if it exists. Otherwise fall back
|
|
|
|
# to the old method.
|
|
|
|
if "rc_message" in config:
|
|
|
|
self.rc_message = RateLimitConfig(
|
|
|
|
config["rc_message"], defaults={"per_second": 0.2, "burst_count": 10.0}
|
|
|
|
)
|
|
|
|
else:
|
|
|
|
self.rc_message = RateLimitConfig(
|
|
|
|
{
|
|
|
|
"per_second": config.get("rc_messages_per_second", 0.2),
|
|
|
|
"burst_count": config.get("rc_message_burst_count", 10.0),
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
# Load the new-style federation config, if it exists. Otherwise, fall
|
|
|
|
# back to the old method.
|
2019-07-05 12:10:19 +02:00
|
|
|
if "rc_federation" in config:
|
2019-05-15 19:06:04 +02:00
|
|
|
self.rc_federation = FederationRateLimitConfig(**config["rc_federation"])
|
|
|
|
else:
|
|
|
|
self.rc_federation = FederationRateLimitConfig(
|
|
|
|
**{
|
|
|
|
"window_size": config.get("federation_rc_window_size"),
|
|
|
|
"sleep_limit": config.get("federation_rc_sleep_limit"),
|
|
|
|
"sleep_delay": config.get("federation_rc_sleep_delay"),
|
|
|
|
"reject_limit": config.get("federation_rc_reject_limit"),
|
|
|
|
"concurrent": config.get("federation_rc_concurrent"),
|
|
|
|
}
|
|
|
|
)
|
2014-09-02 19:00:15 +02:00
|
|
|
|
2019-03-15 18:46:16 +01:00
|
|
|
self.rc_registration = RateLimitConfig(config.get("rc_registration", {}))
|
|
|
|
|
|
|
|
rc_login_config = config.get("rc_login", {})
|
|
|
|
self.rc_login_address = RateLimitConfig(rc_login_config.get("address", {}))
|
|
|
|
self.rc_login_account = RateLimitConfig(rc_login_config.get("account", {}))
|
2019-03-18 13:57:20 +01:00
|
|
|
self.rc_login_failed_attempts = RateLimitConfig(
|
2019-05-15 19:06:04 +02:00
|
|
|
rc_login_config.get("failed_attempts", {})
|
2019-03-18 13:57:20 +01:00
|
|
|
)
|
2019-03-15 18:46:16 +01:00
|
|
|
|
2019-03-20 17:02:25 +01:00
|
|
|
self.federation_rr_transactions_per_room_per_second = config.get(
|
2019-05-15 19:06:04 +02:00
|
|
|
"federation_rr_transactions_per_room_per_second", 50
|
2019-03-20 17:02:25 +01:00
|
|
|
)
|
|
|
|
|
2019-09-11 11:46:38 +02:00
|
|
|
rc_admin_redaction = config.get("rc_admin_redaction")
|
2019-12-12 16:21:12 +01:00
|
|
|
self.rc_admin_redaction = None
|
2019-09-11 11:46:38 +02:00
|
|
|
if rc_admin_redaction:
|
|
|
|
self.rc_admin_redaction = RateLimitConfig(rc_admin_redaction)
|
|
|
|
|
2020-07-31 15:34:42 +02:00
|
|
|
self.rc_joins_local = RateLimitConfig(
|
|
|
|
config.get("rc_joins", {}).get("local", {}),
|
2021-03-23 15:52:20 +01:00
|
|
|
defaults={"per_second": 0.1, "burst_count": 10},
|
2020-07-31 15:34:42 +02:00
|
|
|
)
|
|
|
|
self.rc_joins_remote = RateLimitConfig(
|
|
|
|
config.get("rc_joins", {}).get("remote", {}),
|
2021-03-23 15:52:20 +01:00
|
|
|
defaults={"per_second": 0.01, "burst_count": 10},
|
2020-07-31 15:34:42 +02:00
|
|
|
)
|
|
|
|
|
2021-02-19 19:20:34 +01:00
|
|
|
# Ratelimit cross-user key requests:
|
|
|
|
# * For local requests this is keyed by the sending device.
|
|
|
|
# * For requests received over federation this is keyed by the origin.
|
|
|
|
#
|
|
|
|
# Note that this isn't exposed in the configuration as it is obscure.
|
|
|
|
self.rc_key_requests = RateLimitConfig(
|
|
|
|
config.get("rc_key_requests", {}),
|
|
|
|
defaults={"per_second": 20, "burst_count": 100},
|
|
|
|
)
|
|
|
|
|
2021-01-28 18:39:21 +01:00
|
|
|
self.rc_3pid_validation = RateLimitConfig(
|
|
|
|
config.get("rc_3pid_validation") or {},
|
|
|
|
defaults={"per_second": 0.003, "burst_count": 5},
|
|
|
|
)
|
|
|
|
|
2021-01-29 17:38:29 +01:00
|
|
|
self.rc_invites_per_room = RateLimitConfig(
|
|
|
|
config.get("rc_invites", {}).get("per_room", {}),
|
|
|
|
defaults={"per_second": 0.3, "burst_count": 10},
|
|
|
|
)
|
|
|
|
self.rc_invites_per_user = RateLimitConfig(
|
|
|
|
config.get("rc_invites", {}).get("per_user", {}),
|
|
|
|
defaults={"per_second": 0.003, "burst_count": 5},
|
|
|
|
)
|
|
|
|
|
2019-06-22 01:00:20 +02:00
|
|
|
def generate_config_section(self, **kwargs):
|
2015-04-30 05:24:44 +02:00
|
|
|
return """\
|
|
|
|
## Ratelimiting ##
|
2015-03-02 12:33:45 +01:00
|
|
|
|
2019-05-15 19:06:04 +02:00
|
|
|
# Ratelimiting settings for client actions (registration, login, messaging).
|
2019-03-15 18:46:16 +01:00
|
|
|
#
|
|
|
|
# Each ratelimiting configuration is made of two parameters:
|
|
|
|
# - per_second: number of requests a client can send per second.
|
|
|
|
# - burst_count: number of requests a client can send before being throttled.
|
|
|
|
#
|
|
|
|
# Synapse currently uses the following configurations:
|
2019-05-15 19:06:04 +02:00
|
|
|
# - one for messages that ratelimits sending based on the account the client
|
|
|
|
# is using
|
2019-03-15 18:46:16 +01:00
|
|
|
# - one for registration that ratelimits registration requests based on the
|
|
|
|
# client's IP address.
|
|
|
|
# - one for login that ratelimits login requests based on the client's IP
|
|
|
|
# address.
|
|
|
|
# - one for login that ratelimits login requests based on the account the
|
|
|
|
# client is attempting to log into.
|
2019-03-18 13:57:20 +01:00
|
|
|
# - one for login that ratelimits login requests based on the account the
|
|
|
|
# client is attempting to log into, based on the amount of failed login
|
|
|
|
# attempts for this account.
|
2019-09-11 11:46:38 +02:00
|
|
|
# - one for ratelimiting redactions by room admins. If this is not explicitly
|
|
|
|
# set then it uses the same ratelimiting as per rc_message. This is useful
|
2019-09-11 14:54:50 +02:00
|
|
|
# to allow room admins to deal with abuse quickly.
|
2020-07-31 15:34:42 +02:00
|
|
|
# - two for ratelimiting number of rooms a user can join, "local" for when
|
|
|
|
# users are joining rooms the server is already in (this is cheap) vs
|
|
|
|
# "remote" for when users are trying to join rooms not on the server (which
|
|
|
|
# can be more expensive)
|
2021-01-28 18:39:21 +01:00
|
|
|
# - one for ratelimiting how often a user or IP can attempt to validate a 3PID.
|
2021-01-29 17:38:29 +01:00
|
|
|
# - two for ratelimiting how often invites can be sent in a room or to a
|
|
|
|
# specific user.
|
2019-03-15 18:46:16 +01:00
|
|
|
#
|
|
|
|
# The defaults are as shown below.
|
|
|
|
#
|
2019-05-15 19:06:04 +02:00
|
|
|
#rc_message:
|
|
|
|
# per_second: 0.2
|
|
|
|
# burst_count: 10
|
|
|
|
#
|
2019-03-15 18:46:16 +01:00
|
|
|
#rc_registration:
|
|
|
|
# per_second: 0.17
|
|
|
|
# burst_count: 3
|
|
|
|
#
|
|
|
|
#rc_login:
|
|
|
|
# address:
|
|
|
|
# per_second: 0.17
|
|
|
|
# burst_count: 3
|
|
|
|
# account:
|
|
|
|
# per_second: 0.17
|
|
|
|
# burst_count: 3
|
2019-03-18 13:57:20 +01:00
|
|
|
# failed_attempts:
|
|
|
|
# per_second: 0.17
|
|
|
|
# burst_count: 3
|
2019-09-11 11:46:38 +02:00
|
|
|
#
|
|
|
|
#rc_admin_redaction:
|
|
|
|
# per_second: 1
|
|
|
|
# burst_count: 50
|
2020-07-31 15:34:42 +02:00
|
|
|
#
|
|
|
|
#rc_joins:
|
|
|
|
# local:
|
|
|
|
# per_second: 0.1
|
2021-03-23 15:52:20 +01:00
|
|
|
# burst_count: 10
|
2020-07-31 15:34:42 +02:00
|
|
|
# remote:
|
|
|
|
# per_second: 0.01
|
2021-03-23 15:52:20 +01:00
|
|
|
# burst_count: 10
|
2021-01-28 18:39:21 +01:00
|
|
|
#
|
|
|
|
#rc_3pid_validation:
|
|
|
|
# per_second: 0.003
|
|
|
|
# burst_count: 5
|
2021-01-29 17:38:29 +01:00
|
|
|
#
|
|
|
|
#rc_invites:
|
|
|
|
# per_room:
|
|
|
|
# per_second: 0.3
|
|
|
|
# burst_count: 10
|
|
|
|
# per_user:
|
|
|
|
# per_second: 0.003
|
|
|
|
# burst_count: 5
|
2015-03-02 12:33:45 +01:00
|
|
|
|
2019-05-15 19:06:04 +02:00
|
|
|
# Ratelimiting settings for incoming federation
|
2019-02-19 14:54:29 +01:00
|
|
|
#
|
2019-05-15 19:06:04 +02:00
|
|
|
# The rc_federation configuration is made up of the following settings:
|
|
|
|
# - window_size: window size in milliseconds
|
|
|
|
# - sleep_limit: number of federation requests from a single server in
|
|
|
|
# a window before the server will delay processing the request.
|
|
|
|
# - sleep_delay: duration in milliseconds to delay processing events
|
|
|
|
# from remote servers by if they go over the sleep limit.
|
|
|
|
# - reject_limit: maximum number of concurrent federation requests
|
|
|
|
# allowed from a single server
|
|
|
|
# - concurrent: number of federation requests to concurrently process
|
|
|
|
# from a single server
|
2019-02-19 14:54:29 +01:00
|
|
|
#
|
2019-05-15 19:06:04 +02:00
|
|
|
# The defaults are as shown below.
|
2019-02-19 14:54:29 +01:00
|
|
|
#
|
2019-05-15 19:06:04 +02:00
|
|
|
#rc_federation:
|
|
|
|
# window_size: 1000
|
|
|
|
# sleep_limit: 10
|
|
|
|
# sleep_delay: 500
|
|
|
|
# reject_limit: 50
|
|
|
|
# concurrent: 3
|
2019-03-20 17:02:25 +01:00
|
|
|
|
|
|
|
# Target outgoing federation transaction frequency for sending read-receipts,
|
|
|
|
# per-room.
|
|
|
|
#
|
|
|
|
# If we end up trying to send out more read-receipts, they will get buffered up
|
|
|
|
# into fewer transactions.
|
|
|
|
#
|
|
|
|
#federation_rr_transactions_per_room_per_second: 50
|
2015-04-30 05:24:44 +02:00
|
|
|
"""
|