]>
git.ipfire.org Git - people/pmueller/ipfire-2.x.git/blob - config/cfgroot/general-functions.pl
3 # This code is distributed under the terms of the GPL
5 # (c) The SmoothWall Team
6 # Copyright (C) 2002 Alex Hudson - getcgihash() rewrite
7 # Copyright (C) 2002 Bob Grant <bob@cache.ucr.edu> - validmac()
8 # Copyright (c) 2002/04/13 Steve Bootes - add alias section, helper functions
9 # Copyright (c) 2002/08/23 Mark Wormgoor <mark@wormgoor.com> validfqdn()
10 # Copyright (c) 2003/09/11 Darren Critchley <darrenc@telus.net> srtarray()
12 # $Id: general-functions.pl,v 1.1.2.26 2006/01/04 16:33:55 franck78 Exp $
20 use Locale
::Codes
::Country
;
22 use Net
::IPv4Addr
qw(:all);
23 $|=1; # line buffering
25 $General::version
= 'VERSION';
26 $General::swroot
= 'CONFIG_ROOT';
27 $General::noipprefix
= 'noipg-';
28 $General::adminmanualurl
= 'http://wiki.ipfire.org';
30 require "${General::swroot}/network-functions.pl";
33 # log ("message") use default 'ipcop' tag
34 # log ("tag","message") use your tag
39 $tag = shift if (@_>1);
40 my $logmessage = $_[0];
41 $logmessage =~ /([\w\W]*)/;
43 system('logger', '-t', $tag, $logmessage);
45 sub setup_default_networks
48 my $defaultNetworks = shift;
50 &readhash
("/var/ipfire/ethernet/settings", \
%netsettings);
52 # Get current defined networks (Red, Green, Blue, Orange)
53 $defaultNetworks->{$Lang::tr{'fwhost any'}}{'IPT'} = "0.0.0.0/0.0.0.0";
54 $defaultNetworks->{$Lang::tr{'fwhost any'}}{'NAME'} = "ALL";
56 $defaultNetworks->{$Lang::tr{'green'}}{'IPT'} = "$netsettings{'GREEN_NETADDRESS'}/$netsettings{'GREEN_NETMASK'}";
57 $defaultNetworks->{$Lang::tr{'green'}}{'NET'} = "$netsettings{'GREEN_ADDRESS'}";
58 $defaultNetworks->{$Lang::tr{'green'}}{'NAME'} = "GREEN";
60 if ($netsettings{'RED_DEV'} ne ''){
61 $defaultNetworks->{$Lang::tr{'fwdfw red'}}{'IPT'} = "$netsettings{'RED_NETADDRESS'}/$netsettings{'RED_NETMASK'}";
62 $defaultNetworks->{$Lang::tr{'fwdfw red'}}{'NET'} = "$netsettings{'RED_ADDRESS'}";
63 $defaultNetworks->{$Lang::tr{'fwdfw red'}}{'NAME'} = "RED";
65 if ($netsettings{'ORANGE_DEV'} ne ''){
66 $defaultNetworks->{$Lang::tr{'orange'}}{'IPT'} = "$netsettings{'ORANGE_NETADDRESS'}/$netsettings{'ORANGE_NETMASK'}";
67 $defaultNetworks->{$Lang::tr{'orange'}}{'NET'} = "$netsettings{'ORANGE_ADDRESS'}";
68 $defaultNetworks->{$Lang::tr{'orange'}}{'NAME'} = "ORANGE";
71 if ($netsettings{'BLUE_DEV'} ne ''){
72 $defaultNetworks->{$Lang::tr{'blue'}}{'IPT'} = "$netsettings{'BLUE_NETADDRESS'}/$netsettings{'BLUE_NETMASK'}";
73 $defaultNetworks->{$Lang::tr{'blue'}}{'NET'} = "$netsettings{'BLUE_ADDRESS'}";
74 $defaultNetworks->{$Lang::tr{'blue'}}{'NAME'} = "BLUE";
78 $defaultNetworks->{'IPFire'}{'NAME'} = "IPFire";
81 if(-e
"${General::swroot}/ovpn/settings")
83 my %ovpnSettings = ();
84 &readhash
("${General::swroot}/ovpn/settings", \
%ovpnSettings);
87 if(defined($ovpnSettings{'DOVPN_SUBNET'}))
89 my ($ip,$sub) = split(/\//,$ovpnSettings{'DOVPN_SUBNET'});
90 $sub=&General
::iporsubtocidr
($sub);
91 my @tempovpnsubnet = split("\/", $ovpnSettings{'DOVPN_SUBNET'});
92 $defaultNetworks->{'OpenVPN ' ."($ip/$sub)"}{'ADR'} = $tempovpnsubnet[0];
93 $defaultNetworks->{'OpenVPN ' ."($ip/$sub)"}{'NAME'} = "OpenVPN-Dyn";
97 if(-e
"${General::swroot}/vpn/settings")
99 my %ipsecsettings = ();
100 &readhash
("${General::swroot}/vpn/settings", \
%ipsecsettings);
101 if($ipsecsettings{'RW_NET'} ne '')
103 my ($ip,$sub) = split(/\//,$ipsecsettings{'RW_NET'});
104 $sub=&General
::iporsubtocidr
($sub);
105 my @tempipsecsubnet = split("\/", $ipsecsettings{'RW_NET'});
106 $defaultNetworks->{'IPsec RW (' .$ip."/".$sub.")"}{'ADR'} = $tempipsecsubnet[0];
107 $defaultNetworks->{'IPsec RW (' .$ip."/".$sub.")"}{'NAME'} = "IPsec RW";
108 $defaultNetworks->{'IPsec RW (' .$ip."/".$sub.")"}{'NET'} = &getnextip
($ip);
115 my $defaultNetworks = shift;
116 open(FILE
, "${General::swroot}/ethernet/aliases") or die 'Unable to open aliases file.';
117 my @current = <FILE
>;
120 foreach my $line (@current)
124 my @temp = split(/\,/,$line);
125 if ($temp[2] eq '') {
126 $temp[2] = "Alias $ctr : $temp[0]";
128 $defaultNetworks->{$temp[2]}{'IPT'} = "$temp[0]";
129 $defaultNetworks->{$temp[2]}{'NET'} = "$temp[0]";
138 my $filename = $_[0];
143 # Some ipcop code expects that readhash 'complete' the hash if new entries
144 # are presents. Not clear it !!!
147 open(FILE
, $filename) or die "Unable to read file $filename";
152 ($var, $val) = split /=/, $_, 2;
158 # Untaint variables read from hash
159 # trim space from begin and end
162 $var =~ /([A-Za-z0-9_-]*)/;
166 $hash->{$var} = $val;
175 my $filename = $_[0];
179 # write cgi vars to the file.
180 open(FILE
, ">${filename}") or die "Unable to write file $filename";
182 foreach $var (keys %$hash)
184 if ( $var eq "__CGI__"){next;}
185 $val = $hash->{$var};
186 # Darren Critchley Jan 17, 2003 added the following because when submitting with a graphic, the x and y
187 # location of the mouse are submitted as well, this was being written to the settings file causing
188 # some serious grief! This skips the variable.x and variable.y
189 if (!($var =~ /(.x|.y)$/)) {
192 if (!($var =~ /^ACTION/)) {
193 print FILE
"${var}=${val}\n"; }
201 # This function replaces the given hash in the original hash by keeping the old
202 # content and just replacing the new content
204 my $filename = $_[0];
209 readhash
("${filename}", \
%oldhash);
211 foreach $var (keys %$newhash){
212 $oldhash{$var}=$newhash->{$var};
215 # write cgi vars to the file.
216 open(FILE
, ">${filename}") or die "Unable to write file $filename";
218 foreach $var (keys %oldhash)
220 if ( $var eq "__CGI__"){next;}
221 $val = $oldhash{$var};
222 # Darren Critchley Jan 17, 2003 added the following because when submitting with a graphic, the x and y
223 # location of the mouse are submitted as well, this was being written to the settings file causing
224 # some serious grief! This skips the variable.x and variable.y
225 if (!($var =~ /(.x|.y)$/)) {
228 if (!($var =~ /^ACTION/)) {
229 print FILE
"${var}=${val}\n"; }
236 my ($dev, $ino, $mode, $nlink, $uid, $gid, $rdev, $size,
237 $atime, $mtime, $ctime, $blksize, $blocks) = stat $_[0];
238 my $totalsecs = time() - $mtime;
241 my $secs = $totalsecs % 60;
244 push(@s, "${secs}s");
247 my $min = $totalsecs % 60;
253 my $hrs = $totalsecs % 24;
259 my $days = int($totalsecs);
261 push(@s, "${days}d");
264 return join(" ", reverse(@s));
271 if (!($ip =~ /^(\d+)\.(\d+)\.(\d+)\.(\d+)$/)) {
275 my @octets = ($1, $2, $3, $4);
280 if ($_ < 0 || $_ > 255) {
290 return &Network
::check_netmask
($mask) || &Network
::check_prefix
($mask);
295 my $ipormask = $_[0];
297 # see if it is a IP only.
298 if (&validip
($ipormask)) {
300 # split it into number and mask.
301 if (!($ipormask =~ /^(.*?)\/(.*?
)$/)) {
305 # first part not a ip?
306 if (!(&validip
($ip))) {
308 return &validmask
($mask);
312 return &Network
::convert_netmask2prefix
(shift);
316 return &Network
::convert_prefix2netmask
(shift);
321 #Gets: Ip address or subnetmask in decimal oder CIDR
322 #Gives: What it gets only in CIDR format
327 if ($subnet =~ /^(.*?)\/(.*?
)$/) {
328 ($net,$mask) = split (/\//,$subnet);
334 #Subnet already in decimal and valid?
335 if ($mask=~/^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})$/ &&(($1<=255 && $2<=$1 && $3<=$2 && $4<=$3 ))) {
336 for (my $i=0;$i<=32;$i++){
337 if (&General
::cidrtosub
($i) eq $mask){
338 if ($full == 0){return $mask;}else{
339 return $net."/".$mask;
344 #Subnet in binary format?
345 if ($mask=~/^(\d{1,2})$/ && (($1<=32 && $1>=0))){
346 if($full == 0){ return &General
::cidrtosub
($mask);}else{
347 return $net."/".&General
::cidrtosub
($mask);
358 #gets: Ip Address or subnetmask in decimal oder CIDR
359 #Gives: What it gets only in CIDR format
364 if ($subnet =~ /^(.*?)\/(.*?
)$/) {
365 ($net,$mask) = split (/\//,$subnet);
370 #Subnet in decimal and valid?
371 if ($mask=~/^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})$/ &&(($1<=255 && $2<=$1 && $3<=$2 && $4<=$3 ))) {
372 for (my $i=0;$i<=32;$i++){
373 if (&General
::cidrtosub
($i) eq $mask){
374 if ($full == 0){return &General
::subtocidr
($mask);}else{
375 return $net."/".&General
::subtocidr
($mask);
380 #Subnet already in binary format?
381 if ($mask=~/^(\d{1,2})$/ && (($1<=32 && $1>=0))){
382 if($full == 0){ return $mask;}else{
383 return $net."/".$mask;
392 my $arg = join("/", @_);
394 return &Network
::get_netaddress
($arg);
399 #Gets: IP in Form ("192.168.0.0/24")
400 #Gives: Broadcastaddress of network
402 my ($ccdip,$ccdsubnet) = split "/",$ccdnet;
403 my $ip_address_binary = inet_aton
( $ccdip );
404 my $netmask_binary = ~pack("N", (2**(32-$ccdsubnet))-1);
405 my $broadcast_address = inet_ntoa
( $ip_address_binary | ~$netmask_binary );
406 return $broadcast_address;
410 return &Network
::ip2bin
(shift);
414 return &Network
::bin2ip
(shift);
418 return &Network
::find_next_ip_address
(shift, 4);
422 return &Network
::find_next_ip_address
(shift, -1);
427 #Gets: Ip address in 192.168.0.0/24 or 192.168.0.0/255.255.255.0 and checks if subnet valid
428 #Gives: True bzw 0 if success or false
432 if (!($ccdnet =~ /^(.*?)\/(.*?
)$/)) {
435 my ($ccdip,$ccdsubnet)=split (/\//, $ccdnet);
437 if ($ccdip=~/^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})$/ &&(($1>0 && $1<=255 && $2>=0 && $2<=255 && $3>=0 && $3<=255 && $4<=255 ))) {
438 #Subnet in decimal and valid?
439 if ($ccdsubnet=~/^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})$/ &&(($1<=255 && $2<=$1 && $3<=$2 && $4<=$3 ))) {
440 for (my $i=0;$i<=32;$i++){
441 if (&General
::cidrtosub
($i) eq $ccdsubnet){
445 #Subnet already in binary format?
446 }elsif ($ccdsubnet=~/^(\d{1,2})$/ && (($1<=32 && $1>=0))){
469 my ($ip,$cidr)=split(/\//,$ccdnet);
470 $cidr=&iporsubtocidr
($cidr);
472 #get OVPN-Subnet (dynamic range)
473 &readhash
("${General::swroot}/ovpn/settings", \
%ovpnconf);
474 my ($ovpnip,$ovpncidr)= split (/\//,$ovpnconf{'DOVPN_SUBNET'});
475 $ovpncidr=&iporsubtocidr
($ovpncidr);
477 #check if we try to use same network as ovpn server
478 if ("$ip/$cidr" eq "$ovpnip/$ovpncidr") {
479 $errormessage=$errormessage.$Lang::tr
{'ccd err isovpnnet'}."<br>";
480 return $errormessage;
483 #check if we try to use same network as another ovpn N2N
484 if($ownnet ne 'ovpn'){
485 &readhasharray
("${General::swroot}/ovpn/ovpnconfig", \
%ovpnconfhash);
486 foreach my $key (keys %ovpnconfhash) {
487 if ($ovpnconfhash{$key}[3] eq 'net'){
488 my @ovpnnet=split (/\//,$ovpnconfhash{$key}[11]);
489 if (&IpInSubnet
($ip,$ovpnnet[0],&iporsubtodec
($ovpnnet[1]))){
490 $errormessage=$errormessage.$Lang::tr
{'ccd err isovpnn2n'}." $ovpnconfhash{$key}[1] <br>";
491 return $errormessage;
497 #check if we use a network-name/subnet (static-ovpn) that already exists
498 &readhasharray
("${General::swroot}/ovpn/ccd.conf", \
%ccdconfhash);
499 foreach my $key (keys %ccdconfhash) {
500 @ccdconf=split(/\//,$ccdconfhash{$key}[1]);
501 if ($ccdname eq $ccdconfhash{$key}[0])
503 $errormessage=$errormessage.$Lang::tr
{'ccd err nameexist'}."<br>";
504 return $errormessage;
506 my ($newip,$newsub) = split(/\//,$ccdnet);
507 if (&IpInSubnet
($newip,$ccdconf[0],&iporsubtodec
($ccdconf[1])))
509 $errormessage=$errormessage.$Lang::tr
{'ccd err issubnet'}." $ccdconfhash{$key}[0]<br>";
510 return $errormessage;
514 #check if we use a ipsec right network which is already defined
515 if($ownnet ne 'ipsec'){
516 &General
::readhasharray
("${General::swroot}/vpn/config", \
%ipsecconf);
517 foreach my $key (keys %ipsecconf){
518 if ($ipsecconf{$key}[11] ne ''){
519 my ($ipsecip,$ipsecsub) = split (/\//, $ipsecconf{$key}[11]);
520 $ipsecsub=&iporsubtodec
($ipsecsub);
521 if($ipsecconf{$key}[1] ne $ccdname){
522 if ( &IpInSubnet
($ip,$ipsecip,$ipsecsub) ){
523 $errormessage=$Lang::tr
{'ccd err isipsecnet'}." Name: $ipsecconf{$key}[1]";
524 return $errormessage;
531 #check if we use the ipsec RW Network (if defined)
532 &readhash
("${General::swroot}/vpn/settings", \
%vpnconf);
533 if ($vpnconf{'RW_NET'} ne ''){
534 my ($ipsecrwnet,$ipsecrwsub)=split (/\//, $vpnconf{'RW_NET'});
535 if (&IpInSubnet
($ip,$ipsecrwnet,&iporsubtodec
($ipsecrwsub)))
537 $errormessage=$errormessage.$Lang::tr
{'ccd err isipsecrw'}."<br>";
538 return $errormessage;
542 #check if we use one of ipfire's networks (green,orange,blue)
543 &readhash
("${General::swroot}/ethernet/settings", \
%ownnet);
544 if (($ownnet{'GREEN_NETADDRESS'} ne '' && $ownnet{'GREEN_NETADDRESS'} ne '0.0.0.0') && &IpInSubnet
($ip,$ownnet{'GREEN_NETADDRESS'},&iporsubtodec
($ownnet{'GREEN_NETMASK'}))){ $errormessage=$Lang::tr
{'ccd err green'};return $errormessage;}
545 if (($ownnet{'ORANGE_NETADDRESS'} ne '' && $ownnet{'ORANGE_NETADDRESS'} ne '0.0.0.0') && &IpInSubnet
($ip,$ownnet{'ORANGE_NETADDRESS'},&iporsubtodec
($ownnet{'ORANGE_NETMASK'}))){ $errormessage=$Lang::tr
{'ccd err orange'};return $errormessage;}
546 if (($ownnet{'BLUE_NETADDRESS'} ne '' && $ownnet{'BLUE_NETADDRESS'} ne '0.0.0.0') && &IpInSubnet
($ip,$ownnet{'BLUE_NETADDRESS'},&iporsubtodec
($ownnet{'BLUE_NETMASK'}))){ $errormessage=$Lang::tr
{'ccd err blue'};return $errormessage;}
547 if (($ownnet{'RED_NETADDRESS'} ne '' && $ownnet{'RED_NETADDRESS'} ne '0.0.0.0') && &IpInSubnet
($ip,$ownnet{'RED_NETADDRESS'},&iporsubtodec
($ownnet{'RED_NETMASK'}))){ $errormessage=$Lang::tr
{'ccd err red'};return $errormessage;}
550 sub check_net_internal
{
552 my ($ip,$cidr)=split(/\//,$network);
555 $cidr=&iporsubtocidr
($cidr);
556 #check if we use one of ipfire's networks (green,orange,blue)
557 &readhash
("${General::swroot}/ethernet/settings", \
%ownnet);
558 if (($ownnet{'GREEN_NETADDRESS'} ne '' && $ownnet{'GREEN_NETADDRESS'} ne '0.0.0.0') && &IpInSubnet
($ip,$ownnet{'GREEN_NETADDRESS'},&iporsubtodec
($ownnet{'GREEN_NETMASK'}))){ $errormessage=$Lang::tr
{'ccd err green'};return $errormessage;}
559 if (($ownnet{'ORANGE_NETADDRESS'} ne '' && $ownnet{'ORANGE_NETADDRESS'} ne '0.0.0.0') && &IpInSubnet
($ip,$ownnet{'ORANGE_NETADDRESS'},&iporsubtodec
($ownnet{'ORANGE_NETMASK'}))){ $errormessage=$Lang::tr
{'ccd err orange'};return $errormessage;}
560 if (($ownnet{'BLUE_NETADDRESS'} ne '' && $ownnet{'BLUE_NETADDRESS'} ne '0.0.0.0') && &IpInSubnet
($ip,$ownnet{'BLUE_NETADDRESS'},&iporsubtodec
($ownnet{'BLUE_NETMASK'}))){ $errormessage=$Lang::tr
{'ccd err blue'};return $errormessage;}
561 if (($ownnet{'RED_NETADDRESS'} ne '' && $ownnet{'RED_NETADDRESS'} ne '0.0.0.0') && &IpInSubnet
($ip,$ownnet{'RED_NETADDRESS'},&iporsubtodec
($ownnet{'RED_NETMASK'}))){ $errormessage=$Lang::tr
{'ccd err red'};return $errormessage;}
572 if ($_ >= 1 && $_ <= 65535) {
585 if ($_ == 53 || $_ == 222 || $_ == 444 || $_ == 81 ) {
587 elsif ($_ >= 1 && $_ <= 65535) {
594 my $checkmac = $_[0];
595 my $ot = '[0-9a-f]{2}'; # 2 Hex digits (one octet)
596 if ($checkmac !~ /^$ot:$ot:$ot:$ot:$ot:$ot$/i)
605 # Checks a hostname against RFC1035
606 my $hostname = $_[0];
608 # Each part should be at least two characters in length
609 # but no more than 63 characters
610 if (length ($hostname) < 1 || length ($hostname) > 63) {
612 # Only valid characters are a-z, A-Z, 0-9 and -
613 if ($hostname !~ /^[a-zA-Z0-9-\s]*$/) {
615 # First character can only be a letter or a digit
616 if (substr ($hostname, 0, 1) !~ /^[a-zA-Z0-9]*$/) {
618 # Last character can only be a letter or a digit
619 if (substr ($hostname, -1, 1) !~ /^[a-zA-Z0-9]*$/) {
628 # Checks a domain name against RFC1035
629 my $domainname = $_[0];
630 my @parts = split (/\./, $domainname); # Split hostname at the '.'
632 foreach $part (@parts) {
633 # Each part should be no more than 63 characters in length
634 if (length ($part) < 1 || length ($part) > 63) {
636 # Only valid characters are a-z, A-Z, 0-9 and -
637 if ($part !~ /^[a-zA-Z0-9-]*$/) {
639 # First character can only be a letter or a digit
640 if (substr ($part, 0, 1) !~ /^[a-zA-Z0-9]*$/) {
642 # Last character can only be a letter or a digit
643 if (substr ($part, -1, 1) !~ /^[a-zA-Z0-9]*$/) {
653 # Checks a fully qualified domain name against RFC1035
655 my @parts = split (/\./, $fqdn); # Split hostname at the '.'
656 if (scalar(@parts) < 2) { # At least two parts should
657 return 0;} # exist in a FQDN
658 # (i.e.hostname.domain)
659 foreach $part (@parts) {
660 # Each part should be at least one character in length
661 # but no more than 63 characters
662 if (length ($part) < 1 || length ($part) > 63) {
664 # Only valid characters are a-z, A-Z, 0-9 and -
665 if ($part !~ /^[a-zA-Z0-9-]*$/) {
667 # First character can only be a letter or a digit
668 if (substr ($part, 0, 1) !~ /^[a-zA-Z0-9]*$/) {
670 # Last character can only be a letter or a digit
671 if (substr ($part, -1, 1) !~ /^[a-zA-Z0-9]*$/) {
677 sub validportrange
# used to check a port range
679 my $port = $_[0]; # port values
680 $port =~ tr/-/:/; # replace all - with colons just in case someone used -
681 my $srcdst = $_[1]; # is it a source or destination port
683 if (!($port =~ /^(\d+)\:(\d+)$/)) {
685 if (!(&validport
($port))) {
686 if ($srcdst eq 'src'){
687 return $Lang::tr
{'source port numbers'};
689 return $Lang::tr
{'destination port numbers'};
695 my @ports = ($1, $2);
697 if ($srcdst eq 'src'){
698 return $Lang::tr
{'bad source range'};
700 return $Lang::tr
{'bad destination range'};
705 if (!(&validport
($_))) {
706 if ($srcdst eq 'src'){
707 return $Lang::tr
{'source port numbers'};
709 return $Lang::tr
{'destination port numbers'};
722 return &Network
::ip_address_in_network
($addr, "$network/$netmask");
726 # Return the following IP (IP+1) in dotted notation.
727 # Call: NextIP ('1.1.1.1');
731 return &Network
::find_next_ip_address
(shift, 1);
735 return &Network
::find_next_ip_address
(shift, 4);
739 my ($ip,$cidr) = &Net
::IPv4Addr
::ipv4_parse
(shift);
744 my ($ip,$cidr) = &Net
::IPv4Addr
::ipv4_parse
(shift);
745 my $netmask = &Net
::IPv4Addr
::ipv4_cidr2msk
($cidr);
746 return "$ip\/$netmask";
751 my @parts = split( /\@/, $address );
754 #check if we have one part before and after '@'
755 return 0 if ( $count != 2 );
757 #check if one of the parts starts or ends with a dot
758 return 0 if ( substr($parts[0],0,1) eq '.' );
759 return 0 if ( substr($parts[0],-1,1) eq '.' );
760 return 0 if ( substr($parts[1],0,1) eq '.' );
761 return 0 if ( substr($parts[1],-1,1) eq '.' );
763 #check first addresspart (before '@' sign)
764 return 0 if ( $parts[0] !~ m/^[a-zA-Z0-9\.!\-\+#]+$/ );
766 #check second addresspart (after '@' sign)
767 return 0 if ( $parts[1] !~ m/^[a-zA-Z0-9\.\-]+$/ );
773 # Currently only vpnmain use this three procs (readhasharray, writehasharray, findhasharray)
774 # The 'key' used is numeric but is perfectly unneeded! This will to be removed so don't use
775 # this code. Vpnmain will be splitted in parts: x509/pki, connection ipsec, connection other,... .
778 my ($filename, $hash) = @_;
781 open(FILE
, $filename) or die "Unable to read file $filename";
784 my ($key, $rest, @temp);
786 ($key, $rest) = split (/,/, $_, 2);
787 if ($key =~ /^[0-9]+$/) {
788 @temp = split (/,/, $rest);
789 $hash->{$key} = \
@temp;
797 my ($filename, $hash) = @_;
798 my ($key, @temp, $i);
800 open(FILE
, ">$filename") or die "Unable to write to file $filename";
802 foreach $key (keys %$hash) {
803 if ($key =~ /^[0-9]+$/) {
805 foreach $i (0 .. $#{$hash->{$key}}) {
806 print FILE
",$hash->{$key}[$i]";
815 sub findhasharraykey
{
816 foreach my $i (1 .. 1000000) {
817 if ( ! exists $_[0]{$i}) {
824 # Darren Critchley - darrenc@telus.net - (c) 2003
825 # &srtarray(SortOrder, AlphaNumeric, SortDirection, ArrayToBeSorted)
826 # This subroutine will take the following parameters:
827 # ColumnNumber = the column which you want to sort on, starts at 1
828 # AlphaNumberic = a or n (lowercase) defines whether the sort should be alpha or numberic
829 # SortDirection = asc or dsc (lowercase) Ascending or Descending sort
830 # ArrayToBeSorted = the array that wants sorting
832 # Returns an array that is sorted to your specs
834 # If SortOrder is greater than the elements in array, then it defaults to the first element
837 my ($colno, $alpnum, $srtdir, @tobesorted) = @_;
843 my $ttlitems = scalar @tobesorted; # want to know the number of rows in the passed array
844 if ($ttlitems < 1){ # if no items, don't waste our time lets leave
845 return (@tobesorted);
847 my @tmp = split(/\,/,$tobesorted[0]);
848 $ttlitems = scalar @tmp; # this should be the number of elements in each row of the passed in array
850 # Darren Critchley - validate parameters
851 if ($colno > $ttlitems){$colno = '1';}
852 $colno--; # remove one from colno to deal with arrays starting at 0
853 if($colno < 0){$colno = '0';}
854 if ($alpnum ne '') { $alpnum = lc($alpnum); } else { $alpnum = 'a'; }
855 if ($srtdir ne '') { $srtdir = lc($srtdir); } else { $srtdir = 'src'; }
857 foreach $line (@tobesorted)
861 my @temp = split(/\,/,$line);
862 # Darren Critchley - juggle the fields so that the one we want to sort on is first
863 my $tmpholder = $temp[0];
864 $temp[0] = $temp[$colno];
865 $temp[$colno] = $tmpholder;
867 for ($ctr=0; $ctr < $ttlitems ; $ctr++) {
868 $newline=$newline . $temp[$ctr] . ",";
871 push(@tmparray,$newline);
874 if ($alpnum eq 'n') {
875 @tmparray = sort {$a <=> $b} @tmparray;
877 @tmparray = (sort @tmparray);
879 foreach $line (@tmparray)
883 my @temp = split(/\,/,$line);
884 my $tmpholder = $temp[0];
885 $temp[0] = $temp[$colno];
886 $temp[$colno] = $tmpholder;
888 for ($ctr=0; $ctr < $ttlitems ; $ctr++){
889 $newline=$newline . $temp[$ctr] . ",";
892 push(@srtedarray,$newline);
896 if ($srtdir eq 'dsc') {
897 @tmparray = reverse(@srtedarray);
900 return (@srtedarray);
906 &General
::readhash
("${General::swroot}/proxy/settings", \
%proxysettings);
907 if ($_=$proxysettings{'UPSTREAM_PROXY'}) {
908 my ($peer, $peerport) = (/^(?:[a-zA-Z ]+\:\/\
/)?(?:[A-Za-z0-9\_\.\-]*?(?:\:[A-Za-z0-9\_\.\-]*?)?\@)?([a-zA-Z0-9\.\_\-]*?)(?:\:([0-9]{1,5}))?(?:\/.*?
)?
$/);
909 Net
::SSLeay
::set_proxy
($peer,$peerport,$proxysettings{'UPSTREAM_USER'},$proxysettings{'UPSTREAM_PASSWORD'} );
911 my $user_agent = &MakeUserAgent
();
912 my ($out, $response) = Net
::SSLeay
::get_http
( 'checkip4.dns.lightningwirelabs.com',
915 Net
::SSLeay
::make_headers
('User-Agent' => $user_agent )
917 if ($response =~ m
%HTTP/1\
.. 200 OK
%) {
918 $out =~ /Your IP address is: (\d+.\d+.\d+.\d+)/;
925 # Check if hostname.domain provided have IP provided
926 # use gethostbyname to verify that
932 # 1 IP matches host.domain
935 sub DyndnsServiceSync
($;$;$) {
937 my ($ip,$hostName,$domain) = @_;
940 #fix me no ip GROUP, what is the name ?
941 $hostName =~ s/$General::noipprefix//;
942 if ($hostName) { #may be empty
943 $hostName = "$hostName.$domain";
944 @addresses = gethostbyname($hostName);
947 if ($addresses[0] eq '') { # nothing returned ?
948 $hostName = $domain; # try resolving with domain only
949 @addresses = gethostbyname($hostName);
952 if ($addresses[0] ne '') { # got something ?
953 #&General::log("name:$addresses[0], alias:$addresses[1]");
954 # Build clear text list of IP
955 @addresses = map ( &Socket
::inet_ntoa
($_), @addresses[4..$#addresses]);
956 if (grep (/$ip/, @addresses)) {
963 # This sub returns the red IP used to compare in DyndnsServiceSync
967 &General
::readhash
("${General::swroot}/ddns/settings", \
%settings);
969 open(IP
, "${General::swroot}/red/local-ipaddress") or return 'unavailable';
974 # 100.64.0.0/10 is reserved for dual-stack lite (http://tools.ietf.org/html/rfc6598).
975 if (&General
::IpInSubnet
($ip,'10.0.0.0','255.0.0.0') ||
976 &General
::IpInSubnet
($ip,'172.16.0.0.','255.240.0.0') ||
977 &General
::IpInSubnet
($ip,'192.168.0.0','255.255.0.0') ||
978 &General
::IpInSubnet
($ip,'100.64.0.0', '255.192.0.0'))
980 if ($settings{'BEHINDROUTER'} eq 'FETCH_IP') {
981 my $RealIP = &General
::FetchPublicIp
;
982 $ip = (&General
::validip
($RealIP) ?
$RealIP : 'unavailable');
988 # Translate ICMP code to text
989 # ref: http://www.iana.org/assignments/icmp-parameters
990 sub GetIcmpDescription
($) {
992 my @icmp_description = (
996 'Destination Unreachable',
999 'Alternate Host Address',
1002 'Router Advertisement',
1003 'Router Solicitation', #10
1005 'Parameter Problem',
1008 'Information Request',
1009 'Information Reply',
1010 'Address Mask Request',
1011 'Address Mask Reply',
1012 'Reserved (for Security)',
1013 'Reserved (for Robustness Experiment)', #20
1024 'Datagram Conversion Error',
1025 'Mobile Host Redirect',
1026 'IPv6 Where-Are-You',
1028 'Mobile Registration Request',
1029 'Mobile Registration Reply',
1030 'Domain Name Request',
1031 'Domain Name Reply',
1035 if ($index>41) {return 'unknown'} else {return $icmp_description[$index]};
1038 sub GetCoreUpdateVersion
() {
1041 open(FILE
, "/opt/pakfire/db/core/mine");
1048 return $core_update;
1051 sub MakeUserAgent
() {
1052 my $user_agent = "IPFire/$General::version";
1054 my $core_update = &GetCoreUpdateVersion
();
1055 if ($core_update ne "") {
1056 $user_agent .= "/$core_update";
1062 sub RedIsWireless
() {
1063 # This function checks if a network device is a wireless device.
1066 &readhash
("${General::swroot}/ethernet/settings", \
%settings);
1068 # Find the name of the network device.
1069 my $device = $settings{'RED_DEV'};
1071 # Exit, if no device is configured.
1072 return 0 if ($device eq "");
1074 # Return 1 if the device is a wireless one.
1075 my $path = "/sys/class/net/$device/wireless";
1080 # Otherwise return zero.
1084 # Function to read a file with UTF-8 charset.
1085 sub read_file_utf8
($) {
1088 open my $in, '<:encoding(UTF-8)', $file or die "Could not open '$file' for reading $!";
1096 # Function to write a file with UTF-8 charset.
1097 sub write_file_utf8
($) {
1098 my ($file, $content) = @_;
1100 open my $out, '>:encoding(UTF-8)', $file or die "Could not open '$file' for writing $!";;
1101 print $out $content;
1107 my $FIREWALL_RELOAD_INDICATOR = "${General::swroot}/firewall/reread";
1109 sub firewall_config_changed
() {
1110 open FILE
, ">$FIREWALL_RELOAD_INDICATOR" or die "Could not open $FIREWALL_RELOAD_INDICATOR";
1114 sub firewall_needs_reload
() {
1115 if (-e
"$FIREWALL_RELOAD_INDICATOR") {
1122 sub firewall_reload
() {
1123 system("/usr/local/bin/firewallctrl");
1126 # Function which will return the used interface for the red network zone (red0, ppp0, etc).
1127 sub get_red_interface
() {
1129 open(IFACE
, "${General::swroot}/red/iface") or die "Could not open /var/ipfire/red/iface";
1131 my $interface = <IFACE
>;