]>
Commit | Line | Data |
---|---|---|
25697a35 | 1 | /* |
94ff9470 | 2 | * SARG Squid Analysis Report Generator http://sarg.sourceforge.net |
1164c474 | 3 | * 1998, 2010 |
94ff9470 GS |
4 | * |
5 | * SARG donations: | |
6 | * please look at http://sarg.sourceforge.net/donations.php | |
1164c474 FM |
7 | * Support: |
8 | * http://sourceforge.net/projects/sarg/forums/forum/363374 | |
25697a35 GS |
9 | * --------------------------------------------------------------------- |
10 | * | |
11 | * This program is free software; you can redistribute it and/or modify | |
12 | * it under the terms of the GNU General Public License as published by | |
13 | * the Free Software Foundation; either version 2 of the License, or | |
14 | * (at your option) any later version. | |
15 | * | |
16 | * This program is distributed in the hope that it will be useful, | |
17 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
18 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
19 | * GNU General Public License for more details. | |
20 | * | |
21 | * You should have received a copy of the GNU General Public License | |
22 | * along with this program; if not, write to the Free Software | |
23 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111, USA. | |
24 | * | |
25 | */ | |
26 | ||
27 | #include "include/conf.h" | |
5f3cfd1d | 28 | #include "include/defs.h" |
25697a35 | 29 | |
32e71fa4 | 30 | void authfail_report(void) |
25697a35 | 31 | { |
9bd92830 FM |
32 | FILE *fp_in = NULL, *fp_ou = NULL; |
33 | ||
34 | char *buf; | |
35 | char *url; | |
36 | char authfail_in[MAXLEN]; | |
37 | char report[MAXLEN]; | |
38 | char ip[MAXLEN]; | |
39 | char oip[MAXLEN]; | |
40 | char user[MAXLEN]; | |
41 | char ouser[MAXLEN]; | |
42 | char ouser2[MAXLEN]; | |
43 | char data[15]; | |
44 | char hora[15]; | |
45 | char tmp4[MAXLEN]; | |
46 | char csort[MAXLEN]; | |
47 | int z=0; | |
48 | int count=0; | |
49 | int cstatus; | |
50 | int day,month,year; | |
51 | bool new_user; | |
52 | struct getwordstruct gwarea; | |
53 | longline line; | |
54 | struct userinfostruct *uinfo; | |
55 | struct tm t; | |
56 | ||
57 | if(DataFile[0] != '\0') return; | |
58 | ||
59 | ouser[0]='\0'; | |
60 | ouser2[0]='\0'; | |
61 | oip[0]='\0'; | |
62 | ||
63 | snprintf(tmp4,sizeof(tmp4),"%s/authfail.log.unsort",tmp); | |
64 | ||
65 | if(authfail_count == 0) { | |
66 | unlink(tmp4); | |
67 | return; | |
68 | } | |
69 | ||
70 | snprintf(authfail_in,sizeof(authfail_in),"%s/authfail.log",tmp); | |
71 | snprintf(report,sizeof(report),"%s/authfail.html",outdirname); | |
72 | ||
73 | snprintf(csort,sizeof(csort),"sort -b -T \"%s\" -k 3,3 -k 5,5 -o \"%s\" \"%s\"", tmp, authfail_in, tmp4); | |
74 | cstatus=system(csort); | |
75 | if (!WIFEXITED(cstatus) || WEXITSTATUS(cstatus)) { | |
76 | debuga(_("sort command return status %d\n"),WEXITSTATUS(cstatus)); | |
77 | debuga(_("sort command: %s\n"),csort); | |
78 | exit(EXIT_FAILURE); | |
79 | } | |
80 | if((fp_in=MY_FOPEN(authfail_in,"r"))==NULL) { | |
81 | debuga(_("(authfail) Cannot open file %s\n"),authfail_in); | |
82 | debuga(_("sort command: %s\n"),csort); | |
83 | exit(EXIT_FAILURE); | |
84 | } | |
85 | unlink(tmp4); | |
86 | ||
87 | if((fp_ou=MY_FOPEN(report,"w"))==NULL) { | |
88 | debuga(_("(authfail) Cannot open file %s\n"),report); | |
89 | exit(EXIT_FAILURE); | |
90 | } | |
91 | ||
92 | write_html_header(fp_ou,(IndexTree == INDEX_TREE_DATE) ? 3 : 1,_("Authentication Failures"),HTML_JS_NONE); | |
93 | fputs("<tr><td class=\"header_c\">",fp_ou); | |
94 | fprintf(fp_ou,_("Period: %s"),period.html); | |
95 | fputs("</td></tr>\n",fp_ou); | |
96 | fprintf(fp_ou,"<tr><th class=\"header_c\">%s</th></tr>\n",_("Authentication Failures")); | |
97 | close_html_header(fp_ou); | |
98 | ||
99 | fputs("<div class=\"report\"><table cellpadding=\"0\" cellspacing=\"2\">\n",fp_ou); | |
100 | fprintf(fp_ou,"<tr><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th></tr>\n",_("USERID"),_("IP/NAME"),_("DATE/TIME"),_("ACCESSED SITE")); | |
101 | ||
102 | if ((line=longline_create())==NULL) { | |
103 | debuga(_("Not enough memory to read file %s\n"),authfail_in); | |
104 | exit(EXIT_FAILURE); | |
105 | } | |
106 | ||
107 | while((buf=longline_read(fp_in,line))!=NULL) { | |
108 | getword_start(&gwarea,buf); | |
109 | if (getword(data,sizeof(data),&gwarea,'\t')<0) { | |
110 | debuga(_("There is a broken date in file %s\n"),authfail_in); | |
111 | exit(EXIT_FAILURE); | |
112 | } | |
113 | if (getword(hora,sizeof(hora),&gwarea,'\t')<0) { | |
114 | debuga(_("There is a broken time in file %s\n"),authfail_in); | |
115 | exit(EXIT_FAILURE); | |
116 | } | |
117 | if (getword(user,sizeof(user),&gwarea,'\t')<0) { | |
118 | debuga(_("There is a broken user ID in file %s\n"),authfail_in); | |
119 | exit(EXIT_FAILURE); | |
120 | } | |
121 | if (getword(ip,sizeof(ip),&gwarea,'\t')<0) { | |
122 | debuga(_("There is a broken IP address in file %s\n"),authfail_in); | |
123 | exit(EXIT_FAILURE); | |
124 | } | |
125 | if (getword_ptr(buf,&url,&gwarea,'\t')<0) { | |
126 | debuga(_("There is a broken url in file %s\n"),authfail_in); | |
127 | exit(EXIT_FAILURE); | |
128 | } | |
129 | if (sscanf(data,"%d/%d/%d",&day,&month,&year)!=3) continue; | |
130 | computedate(year,month,day,&t); | |
131 | strftime(data,sizeof(data),"%x",&t); | |
132 | ||
133 | uinfo=userinfo_find_from_id(user); | |
134 | if (!uinfo) { | |
135 | debuga(_("Unknown user ID %s in file %s\n"),user,authfail_in); | |
136 | exit(EXIT_FAILURE); | |
137 | } | |
138 | ||
139 | new_user=false; | |
140 | if(z == 0) { | |
141 | strcpy(ouser,user); | |
142 | strcpy(oip,ip); | |
143 | z++; | |
144 | new_user=true; | |
145 | } else { | |
146 | if(strcmp(ouser,user) != 0) { | |
147 | strcpy(ouser,user); | |
148 | new_user=true; | |
149 | } | |
150 | if(strcmp(oip,ip) != 0) { | |
151 | strcpy(oip,ip); | |
152 | new_user=true; | |
153 | } | |
154 | } | |
155 | ||
156 | if(AuthfailReportLimit>0) { | |
157 | if(strcmp(ouser2,uinfo->label) == 0) { | |
158 | count++; | |
159 | } else { | |
160 | count=1; | |
161 | strcpy(ouser2,uinfo->label); | |
162 | } | |
163 | if(count >= AuthfailReportLimit) | |
164 | continue; | |
165 | } | |
166 | ||
167 | fputs("<tr>",fp_ou); | |
168 | if (new_user) | |
169 | fprintf(fp_ou,"<td class=\"data2\">%s</td><td class=\"data2\">%s</td>",uinfo->label,ip); | |
170 | else | |
171 | fputs("<td class=\"data2\"></td><td class=\"data2\"></td>",fp_ou); | |
172 | fprintf(fp_ou,"<td class=\"data2\">%s-%s</td><td class=\"data2\">",data,hora); | |
173 | if(BlockIt[0]!='\0') { | |
174 | fprintf(fp_ou,"<a href=\"%s%s?url=",wwwDocumentRoot,BlockIt); | |
175 | output_html_url(fp_ou,url); | |
176 | fputs("\"><img src=\"../images/sarg-squidguard-block.png\"></a> ",fp_ou); | |
177 | } | |
178 | fputs("<a href=\"",fp_ou); | |
179 | output_html_url(fp_ou,url); | |
180 | fputs("\">",fp_ou); | |
181 | output_html_string(fp_ou,url,100); | |
182 | fputs("</a></td></th>\n",fp_ou); | |
183 | } | |
184 | fclose(fp_in); | |
185 | longline_destroy(&line); | |
186 | ||
187 | fputs("</table></div>\n",fp_ou); | |
188 | if (write_html_trailer(fp_ou)<0) | |
189 | debuga(_("Write error in file %s\n"),report); | |
190 | if (fclose(fp_ou)==EOF) | |
191 | debuga(_("Failed to close file %s - %s\n"),report,strerror(errno)); | |
192 | ||
193 | unlink(authfail_in); | |
194 | ||
195 | return; | |
25697a35 | 196 | } |