]>
Commit | Line | Data |
---|---|---|
25697a35 | 1 | /* |
94ff9470 | 2 | * SARG Squid Analysis Report Generator http://sarg.sourceforge.net |
61d965f3 | 3 | * 1998, 2012 |
94ff9470 GS |
4 | * |
5 | * SARG donations: | |
6 | * please look at http://sarg.sourceforge.net/donations.php | |
1164c474 FM |
7 | * Support: |
8 | * http://sourceforge.net/projects/sarg/forums/forum/363374 | |
25697a35 GS |
9 | * --------------------------------------------------------------------- |
10 | * | |
11 | * This program is free software; you can redistribute it and/or modify | |
12 | * it under the terms of the GNU General Public License as published by | |
13 | * the Free Software Foundation; either version 2 of the License, or | |
14 | * (at your option) any later version. | |
15 | * | |
16 | * This program is distributed in the hope that it will be useful, | |
17 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
18 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
19 | * GNU General Public License for more details. | |
20 | * | |
21 | * You should have received a copy of the GNU General Public License | |
22 | * along with this program; if not, write to the Free Software | |
23 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111, USA. | |
24 | * | |
25 | */ | |
26 | ||
27 | #include "include/conf.h" | |
5f3cfd1d | 28 | #include "include/defs.h" |
25697a35 | 29 | |
7ae50eee FM |
30 | static void show_ignored_auth(FILE *fp_ou,int count) |
31 | { | |
32 | char ignored[80]; | |
33 | ||
34 | snprintf(ignored,sizeof(ignored),ngettext("%d more authentication failure not shown here…","%d more authentication failures not shown here…",count),count); | |
35 | fprintf(fp_ou,"<tr><td class=\"data\"></td><td class=\"data\"></td><td class=\"data\"></td><td class=\"data2 more\">%s</td></tr>\n",ignored); | |
36 | } | |
37 | ||
32e71fa4 | 38 | void authfail_report(void) |
25697a35 | 39 | { |
9bd92830 FM |
40 | FILE *fp_in = NULL, *fp_ou = NULL; |
41 | ||
42 | char *buf; | |
43 | char *url; | |
44 | char authfail_in[MAXLEN]; | |
45 | char report[MAXLEN]; | |
46 | char ip[MAXLEN]; | |
47 | char oip[MAXLEN]; | |
48 | char user[MAXLEN]; | |
49 | char ouser[MAXLEN]; | |
50 | char ouser2[MAXLEN]; | |
51 | char data[15]; | |
52 | char hora[15]; | |
53 | char tmp4[MAXLEN]; | |
54 | char csort[MAXLEN]; | |
55 | int z=0; | |
56 | int count=0; | |
57 | int cstatus; | |
58 | int day,month,year; | |
59 | bool new_user; | |
60 | struct getwordstruct gwarea; | |
61 | longline line; | |
62 | struct userinfostruct *uinfo; | |
63 | struct tm t; | |
64 | ||
65 | if(DataFile[0] != '\0') return; | |
66 | ||
67 | ouser[0]='\0'; | |
68 | ouser2[0]='\0'; | |
69 | oip[0]='\0'; | |
70 | ||
c98d6a0f | 71 | snprintf(tmp4,sizeof(tmp4),"%s/authfail.int_unsort",tmp); |
9bd92830 FM |
72 | |
73 | if(authfail_count == 0) { | |
11767c6a FM |
74 | if (!KeepTempLog && unlink(tmp4)) { |
75 | debuga(_("Cannot delete \"%s\": %s\n"),tmp4,strerror(errno)); | |
76 | } | |
9f93fec3 | 77 | if (debugz) debugaz(_("Authentication failures report not produced because it is empty\n")); |
9bd92830 FM |
78 | return; |
79 | } | |
80 | ||
c98d6a0f | 81 | snprintf(authfail_in,sizeof(authfail_in),"%s/authfail.int_log",tmp); |
9bd92830 FM |
82 | snprintf(report,sizeof(report),"%s/authfail.html",outdirname); |
83 | ||
eb843369 | 84 | snprintf(csort,sizeof(csort),"sort -b -t \"\t\" -T \"%s\" -k 3,3 -k 5,5 -o \"%s\" \"%s\"", tmp, authfail_in, tmp4); |
9bd92830 FM |
85 | cstatus=system(csort); |
86 | if (!WIFEXITED(cstatus) || WEXITSTATUS(cstatus)) { | |
87 | debuga(_("sort command return status %d\n"),WEXITSTATUS(cstatus)); | |
88 | debuga(_("sort command: %s\n"),csort); | |
89 | exit(EXIT_FAILURE); | |
90 | } | |
91 | if((fp_in=MY_FOPEN(authfail_in,"r"))==NULL) { | |
92 | debuga(_("(authfail) Cannot open file %s\n"),authfail_in); | |
93 | debuga(_("sort command: %s\n"),csort); | |
94 | exit(EXIT_FAILURE); | |
95 | } | |
11767c6a FM |
96 | if (!KeepTempLog && unlink(tmp4)) { |
97 | debuga(_("Cannot delete \"%s\": %s\n"),tmp4,strerror(errno)); | |
08f9b029 FM |
98 | exit(EXIT_FAILURE); |
99 | } | |
9bd92830 FM |
100 | |
101 | if((fp_ou=MY_FOPEN(report,"w"))==NULL) { | |
007905af FM |
102 | debuga(_("(authfail) Cannot open file %s\n"),report); |
103 | exit(EXIT_FAILURE); | |
9bd92830 FM |
104 | } |
105 | ||
106 | write_html_header(fp_ou,(IndexTree == INDEX_TREE_DATE) ? 3 : 1,_("Authentication Failures"),HTML_JS_NONE); | |
107 | fputs("<tr><td class=\"header_c\">",fp_ou); | |
108 | fprintf(fp_ou,_("Period: %s"),period.html); | |
109 | fputs("</td></tr>\n",fp_ou); | |
110 | fprintf(fp_ou,"<tr><th class=\"header_c\">%s</th></tr>\n",_("Authentication Failures")); | |
111 | close_html_header(fp_ou); | |
112 | ||
113 | fputs("<div class=\"report\"><table cellpadding=\"0\" cellspacing=\"2\">\n",fp_ou); | |
114 | fprintf(fp_ou,"<tr><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th></tr>\n",_("USERID"),_("IP/NAME"),_("DATE/TIME"),_("ACCESSED SITE")); | |
115 | ||
116 | if ((line=longline_create())==NULL) { | |
117 | debuga(_("Not enough memory to read file %s\n"),authfail_in); | |
118 | exit(EXIT_FAILURE); | |
119 | } | |
120 | ||
121 | while((buf=longline_read(fp_in,line))!=NULL) { | |
122 | getword_start(&gwarea,buf); | |
123 | if (getword(data,sizeof(data),&gwarea,'\t')<0) { | |
124 | debuga(_("There is a broken date in file %s\n"),authfail_in); | |
125 | exit(EXIT_FAILURE); | |
126 | } | |
127 | if (getword(hora,sizeof(hora),&gwarea,'\t')<0) { | |
128 | debuga(_("There is a broken time in file %s\n"),authfail_in); | |
129 | exit(EXIT_FAILURE); | |
130 | } | |
131 | if (getword(user,sizeof(user),&gwarea,'\t')<0) { | |
132 | debuga(_("There is a broken user ID in file %s\n"),authfail_in); | |
133 | exit(EXIT_FAILURE); | |
134 | } | |
135 | if (getword(ip,sizeof(ip),&gwarea,'\t')<0) { | |
136 | debuga(_("There is a broken IP address in file %s\n"),authfail_in); | |
137 | exit(EXIT_FAILURE); | |
138 | } | |
139 | if (getword_ptr(buf,&url,&gwarea,'\t')<0) { | |
140 | debuga(_("There is a broken url in file %s\n"),authfail_in); | |
141 | exit(EXIT_FAILURE); | |
142 | } | |
143 | if (sscanf(data,"%d/%d/%d",&day,&month,&year)!=3) continue; | |
144 | computedate(year,month,day,&t); | |
145 | strftime(data,sizeof(data),"%x",&t); | |
146 | ||
147 | uinfo=userinfo_find_from_id(user); | |
148 | if (!uinfo) { | |
149 | debuga(_("Unknown user ID %s in file %s\n"),user,authfail_in); | |
150 | exit(EXIT_FAILURE); | |
151 | } | |
152 | ||
153 | new_user=false; | |
154 | if(z == 0) { | |
155 | strcpy(ouser,user); | |
156 | strcpy(oip,ip); | |
157 | z++; | |
158 | new_user=true; | |
159 | } else { | |
160 | if(strcmp(ouser,user) != 0) { | |
161 | strcpy(ouser,user); | |
162 | new_user=true; | |
163 | } | |
164 | if(strcmp(oip,ip) != 0) { | |
165 | strcpy(oip,ip); | |
166 | new_user=true; | |
167 | } | |
168 | } | |
169 | ||
007905af FM |
170 | if(AuthfailReportLimit>0) { |
171 | if(strcmp(ouser2,uinfo->label) == 0) { | |
9bd92830 FM |
172 | count++; |
173 | } else { | |
7ae50eee FM |
174 | if(count>AuthfailReportLimit && AuthfailReportLimit>0) |
175 | show_ignored_auth(fp_ou,count-AuthfailReportLimit); | |
9bd92830 FM |
176 | count=1; |
177 | strcpy(ouser2,uinfo->label); | |
178 | } | |
7ae50eee | 179 | if(count > AuthfailReportLimit) |
9bd92830 FM |
180 | continue; |
181 | } | |
182 | ||
183 | fputs("<tr>",fp_ou); | |
184 | if (new_user) | |
185 | fprintf(fp_ou,"<td class=\"data2\">%s</td><td class=\"data2\">%s</td>",uinfo->label,ip); | |
186 | else | |
187 | fputs("<td class=\"data2\"></td><td class=\"data2\"></td>",fp_ou); | |
188 | fprintf(fp_ou,"<td class=\"data2\">%s-%s</td><td class=\"data2\">",data,hora); | |
67a93701 | 189 | if(BlockIt[0]!='\0' && url[0]!=ALIAS_PREFIX) { |
9bd92830 FM |
190 | fprintf(fp_ou,"<a href=\"%s%s?url=",wwwDocumentRoot,BlockIt); |
191 | output_html_url(fp_ou,url); | |
192 | fputs("\"><img src=\"../images/sarg-squidguard-block.png\"></a> ",fp_ou); | |
193 | } | |
6fa33a32 | 194 | output_html_link(fp_ou,url,100); |
67a93701 | 195 | fputs("</td></th>\n",fp_ou); |
9bd92830 FM |
196 | } |
197 | fclose(fp_in); | |
198 | longline_destroy(&line); | |
199 | ||
7ae50eee FM |
200 | if(count>AuthfailReportLimit && AuthfailReportLimit>0) |
201 | show_ignored_auth(fp_ou,count-AuthfailReportLimit); | |
202 | ||
9bd92830 FM |
203 | fputs("</table></div>\n",fp_ou); |
204 | if (write_html_trailer(fp_ou)<0) | |
205 | debuga(_("Write error in file %s\n"),report); | |
206 | if (fclose(fp_ou)==EOF) | |
207 | debuga(_("Failed to close file %s - %s\n"),report,strerror(errno)); | |
208 | ||
11767c6a FM |
209 | if (!KeepTempLog && unlink(authfail_in)) { |
210 | debuga(_("Cannot delete \"%s\": %s\n"),authfail_in,strerror(errno)); | |
08f9b029 FM |
211 | exit(EXIT_FAILURE); |
212 | } | |
9bd92830 FM |
213 | |
214 | return; | |
25697a35 | 215 | } |