]>
git.ipfire.org Git - people/pmueller/ipfire-2.x.git/blob - html/cgi-bin/guardian.cgi
2 ###############################################################################
4 # IPFire.org - A linux based firewall #
5 # Copyright (C) 2014 IPFire Team <info@ipfire.org> #
7 # This program is free software: you can redistribute it and/or modify #
8 # it under the terms of the GNU General Public License as published by #
9 # the Free Software Foundation, either version 3 of the License, or #
10 # (at your option) any later version. #
12 # This program is distributed in the hope that it will be useful, #
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of #
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
15 # GNU General Public License for more details. #
17 # You should have received a copy of the GNU General Public License #
18 # along with this program. If not, see <http://www.gnu.org/licenses/>. #
20 ###############################################################################
25 # enable only the following on debugging purpose
27 use CGI
::Carp
'fatalsToBrowser';
29 require '/var/ipfire/general-functions.pl';
30 require "${General::swroot}/lang.pl";
31 require "${General::swroot}/header.pl";
33 #workaround to suppress a warning when a variable is used only once
36 ${Header
::colourgreen
}
47 # Path to the guardian.ignore file.
48 my $ignorefile ='/var/ipfire/guardian/guardian.ignore';
50 our %netsettings = ();
51 &General
::readhash
("${General::swroot}/ethernet/settings", \
%netsettings);
54 our %mainsettings = ();
55 &General
::readhash
("${General::swroot}/main/settings", \
%mainsettings);
56 &General
::readhash
("/srv/web/ipfire/html/themes/".$mainsettings{'THEME'}."/include/colors.txt", \
%color);
58 # Pakfire meta file for owncloud.
59 # (File exists when the addon is installed.)
60 my $owncloud_meta = "/opt/pakfire/db/installed/meta-owncloud";
64 $settings{'ACTION'} = '';
66 $settings{'GUARDIAN_ENABLED'} = 'off';
67 $settings{'GUARDIAN_ENABLE_SNORT'} = 'on';
68 $settings{'GUARDIAN_ENABLE_SSH'} = 'on';
69 $settings{'GUARDIAN_ENABLE_HTTPD'} = 'on';
70 $settings{'GUARDIAN_ENABLE_OWNCLOUD'} = '';
71 $settings{'GUARDIAN_LOGLEVEL'} = 'info';
72 $settings{'GUARDIAN_BLOCKCOUNT'} = '3';
73 $settings{'GUARDIAN_BLOCKTIME'} = '86400';
74 $settings{'GUARDIAN_LOGFILE'} = '/var/log/guardian/guardian.log';
75 $settings{'GUARDIAN_SNORT_ALERTFILE'} = '/var/log/snort/alert';
76 $settings{'GUARDIAN_PRIORITY_LEVEL'} = '3';
78 # Default settings for owncloud if installed.
79 if ( -e
"$owncloud_meta") {
80 $settings{'GUARDIAN_ENABLE_OWNCLOUD'} = 'off';
83 my $errormessage = '';
85 &Header
::showhttpheaders
();
88 &Header
::getcgihash
(\
%settings);
90 # Check if guardian is running and grab some stats.
94 ## Perform input checks and save settings.
96 if ($settings{'ACTION'} eq $Lang::tr
{'save'}) {
97 # Check for valid blocktime.
98 unless(($settings{'GUARDIAN_BLOCKTIME'} =~ /^\d+$/) && ($settings{'GUARDIAN_BLOCKTIME'} ne "0")) {
99 $errormessage = "$Lang::tr{'guardian invalid blocktime'}";
102 # Check if the bloccount is valid.
103 unless(($settings{'GUARDIAN_BLOCKCOUNT'} =~ /^\d+$/) && ($settings{'GUARDIAN_BLOCKCOUNT'} ne "0")) {
104 $errormessage = "$Lang::tr{'guardian invalid blockcount'}";
108 unless($settings{'GUARDIAN_LOGFILE'} =~ /^[a-zA-Z0-9\.\/]+$/) {
109 $errormessage = "$Lang::tr{'guardian invalid logfile'}";
112 # Check input for snort alert file.
113 unless($settings{'GUARDIAN_SNORT_ALERTFILE'} =~ /^[a-zA-Z0-9\.\/]+$/) {
114 $errormessage = "$Lang::tr{'guardian invalid alertfile'}";
117 # Only continue if no error message has been set.
118 if($errormessage eq '') {
119 # Write configuration settings to file.
120 &General
::writehash
("${General::swroot}/guardian/settings", \
%settings);
122 # Update configuration files.
123 &BuildConfiguration
();
126 ## Add a new entry to the ignore file.
128 } elsif ($settings{'ACTION'} eq $Lang::tr
{'add'}) {
130 # Check if any input has been performed.
131 if ($settings{'NEW_IGNORE_ENTRY'} ne '') {
133 # Check if the given input is no valid IP-address or IP-address with subnet, display an error message.
134 if ((!&General
::validip
($settings{'NEW_IGNORE_ENTRY'})) && (!&General
::validipandmask
($settings{'NEW_IGNORE_ENTRY'}))) {
135 $errormessage = "$Lang::tr{'guardian invalid address or subnet'}";
138 $errormessage = "$Lang::tr{'guardian empty input'}";
141 # Go further if there was no error.
142 if ($errormessage eq '') {
143 my $new_entry = $settings{'NEW_IGNORE_ENTRY'};
145 # Open file for appending the new entry.
146 open (FILE
, ">>$ignorefile") or die "Unable to open $ignorefile for writing";
148 # Write the new entry to the ignore file.
149 print FILE
"$new_entry\n";
153 # Check if guardian is running.
155 # Call guardianctrl to perform a reload.
156 system("/usr/local/bin/guardianctrl reload &>/dev/null");
159 ## Remove entry from ignore list.
161 } elsif ($settings{'ACTION'} eq $Lang::tr
{'remove'}) {
164 # Open ignorefile and read content.
165 open(FILE
, "<$ignorefile") or die "Unable to open $ignorefile.";
166 my @current = <FILE
>;
169 # Re-open ignorefile for writing.
170 open(FILE
, ">$ignorefile") or die "Unable to open $ignorefile for writing";
173 # Read line by line from ignorefile and write them back except the line with the given ID.
174 # So this line is missing in the new file and the entry has been deleted.
175 foreach my $line (@current) {
177 unless ($settings{'ID'} eq $id) {
183 # Check if guardian is running.
185 # Call guardianctrl to perform a reload.
186 system("/usr/local/bin/guardianctrl reload &>/dev/null");
189 ## Block a user given address or subnet.
191 } elsif ($settings{'ACTION'} eq $Lang::tr
{'block'}) {
193 # Assign some temporary variables used for input validation.
194 my $input = $settings{'ADDRESS_BLOCK'};
195 my $green = $netsettings{'GREEN_ADDRESS'};
196 my $blue = $netsettings{'BLUE_ADDRESS'};
197 my $orange = $netsettings{'ORANGE_ADDRESS'};
198 my $red = $netsettings{'RED_ADDRESS'};
200 # Get gateway address.
201 my $gateway = &General
::get_gateway
();
203 # Check if any input has been performed.
205 $errormessage = "$Lang::tr{'guardian empty input'}";
208 # Check if the given input is localhost (127.0.0.1).
209 elsif ($input eq "127.0.0.1") {
210 $errormessage = "$Lang::tr{'guardian blocking of this address is not allowed'}";
213 # Check if the given input is anywhere (0.0.0.0).
214 elsif ($input eq "0.0.0.0") {
215 $errormessage = "$Lang::tr{'guardian blocking of this address is not allowed'}";
218 # Check if the given input is one of the interface addresses or our gateway.
219 elsif ($input eq "$green" || $input eq "$blue" || $input eq "$orange" || $input eq "$red" || $input eq "$gateway") {
220 $errormessage = "$Lang::tr{'guardian blocking of this address is not allowed'}";
223 # Check if the given input is a valid IP address.
224 elsif (!&General
::validip
($input)) {
225 $errormessage = "$Lang::tr{'guardian invalid address or subnet'}";
228 # Go further if there was no error.
229 if ($errormessage eq '') {
230 my $block = $settings{'ADDRESS_BLOCK'};
232 # Call helper to unblock address.
233 system("/usr/local/bin/guardianctrl block $block &>/dev/null");
236 ## Unblock address or subnet.
238 } elsif ($settings{'ACTION'} eq $Lang::tr
{'unblock'}) {
240 # Check if no empty input has been performed.
241 if ($settings{'ADDRESS_UNBLOCK'} ne '') {
243 # Check if the given input is no valid IP-address or IP-address with subnet, display an error message.
244 if ((!&General
::validip
($settings{'ADDRESS_UNBLOCK'})) && (!&General
::validipandmask
($settings{'ADDRESS_UNBLOCK'}))) {
245 $errormessage = "$Lang::tr{'guardian invalid address or subnet'}";
249 $errormessage = "$Lang::tr{'guardian empty input'}";
252 # Go further if there was no error.
253 if ($errormessage eq '') {
254 my $unblock = $settings{'ADDRESS_UNBLOCK'};
256 # Call helper to unblock address.
257 system("/usr/local/bin/guardianctrl unblock $unblock &>/dev/null");
262 } elsif ($settings{'ACTION'} eq $Lang::tr
{'unblock all'}) {
264 # Call helper to flush iptables chain from guardian.
265 system("/usr/local/bin/guardianctrl flush-chain &>/dev/null");
268 # Load settings from file.
269 &General
::readhash
("${General::swroot}/guardian/settings", \
%settings);
271 # Call functions to generate whole page.
275 # Display area only if guardian is running.
276 if ( ($memory != 0) && ($pid > 0) ) {
280 # Function to display the status of guardian and allow base configuration.
285 $checked{'GUARDIAN_ENABLED'}{'on'} = '';
286 $checked{'GUARDIAN_ENABLED'}{'off'} = '';
287 $checked{'GUARDIAN_ENABLED'}{$settings{'GUARDIAN_ENABLED'}} = 'checked';
288 $checked{'GUARDIAN_ENABLE_SNORT'}{'off'} = '';
289 $checked{'GUARDIAN_ENABLE_SNORT'}{'on'} = '';
290 $checked{'GUARDIAN_ENABLE_SNORT'}{$settings{'GUARDIAN_ENABLE_SNORT'}} = "checked='checked'";
291 $checked{'GUARDIAN_ENABLE_SSH'}{'off'} = '';
292 $checked{'GUARDIAN_ENABLE_SSH'}{'on'} = '';
293 $checked{'GUARDIAN_ENABLE_SSH'}{$settings{'GUARDIAN_ENABLE_SSH'}} = "checked='checked'";
294 $checked{'GUARDIAN_ENABLE_HTTPD'}{'off'} = '';
295 $checked{'GUARDIAN_ENABLE_HTTPD'}{'on'} = '';
296 $checked{'GUARDIAN_ENABLE_HTTPD'}{$settings{'GUARDIAN_ENABLE_HTTPD'}} = "checked='checked'";
297 $checked{'GUARDIAN_ENABLE_OWNCLOUD'}{'off'} = '';
298 $checked{'GUARDIAN_ENABLE_OWNCLOUD'}{'on'} = '';
299 $checked{'GUARDIAN_ENABLE_OWNCLOUD'}{$settings{'GUARDIAN_ENABLE_OWNCLOUD'}} = "checked='checked'";
301 $selected{'GUARDIAN_LOGLEVEL'}{$settings{'GUARDIAN_LOGLEVEL'}} = 'selected';
302 $selected{'GUARDIAN_PRIORITY_LEVEL'}{$settings{'GUARDIAN_PRIORITY_LEVEL'}} = 'selected';
304 &Header
::openpage
($Lang::tr
{'guardian configuration'}, 1, '');
305 &Header
::openbigbox
('100%', 'left', '', $errormessage);
307 # Print errormessage if there is one.
309 &Header
::openbox
('100%', 'left', $Lang::tr
{'error messages'});
310 print "<font class='base'>$errormessage </font>\n";
315 # Draw current guardian state.
316 &Header
::openbox
('100%', 'center', $Lang::tr
{'guardian'});
318 # Get current status of guardian.
322 # Display some useful information related to guardian, if daemon is running.
323 if ( ($memory != 0) && ($pid > 0) ){
325 <table width='95%' cellspacing='0' class='tbl'>
327 <th bgcolor='$color{'color20'}' colspan='3' align='left'><strong>$Lang::tr{'guardian service'}</strong></th>
330 <td class='base'>$Lang::tr{'guardian daemon'}</td>
331 <td align='center' colspan='2' width='75%' bgcolor='${Header::colourgreen}'><font color='white'><strong>$Lang::tr{'running'}</strong></font></td>
334 <td class='base'></td>
335 <td bgcolor='$color{'color20'}' align='center'><strong>PID</strong></td>
336 <td bgcolor='$color{'color20'}' align='center'><strong>$Lang::tr{'memory'}</strong></td>
339 <td class='base'></td>
340 <td bgcolor='$color{'color22'}' align='center'>$pid</td>
341 <td bgcolor='$color{'color22'}' align='center'>$memory KB</td>
346 # Otherwise display a hint that the service is not launched.
348 <table width='95%' cellspacing='0' class='tbl'>
350 <th bgcolor='$color{'color20'}' colspan='3' align='left'><strong>$Lang::tr{'guardian service'}</strong></th>
353 <td class='base'>$Lang::tr{'guardian daemon'}</td>
354 <td align='center' width='75%' bgcolor='${Header::colourred}'><font color='white'><strong>$Lang::tr{'stopped'}</strong></font></td>
362 # Draw elements for guardian configuration.
363 &Header
::openbox
('100%', 'center', $Lang::tr
{'guardian configuration'});
366 <form method='post' action='$ENV{'SCRIPT_NAME'}'>
370 <td colspan='2' class='base' bgcolor='$color{'color20'}'><b>$Lang::tr{'guardian common settings'}</b></td>
373 <td width='20%' class='base'>$Lang::tr{'guardian enabled'}:</td>
374 <td><input type='checkbox' name='GUARDIAN_ENABLED' $checked{'GUARDIAN_ENABLED'}{'on'} /></td>
377 <td colspan='2'><br></td>
380 <td width='20%' class='base'>$Lang::tr{'guardian watch snort alertfile'}</td>
381 <td align='left'>on <input type='radio' name='GUARDIAN_ENABLE_SNORT' value='on' $checked{'GUARDIAN_ENABLE_SNORT'}{'on'} /> /
382 <input type='radio' name='GUARDIAN_ENABLE_SNORT' value='off' $checked{'GUARDIAN_ENABLE_SNORT'}{'off'} /> off</td>
385 <td width='20%' class='base'>$Lang::tr{'guardian block ssh brute-force'}</td>
386 <td align='left'>on <input type='radio' name='GUARDIAN_ENABLE_SSH' value='on' $checked{'GUARDIAN_ENABLE_SSH'}{'on'} /> /
387 <input type='radio' name='GUARDIAN_ENABLE_SSH' value='off' $checked{'GUARDIAN_ENABLE_SSH'}{'off'} /> off</td>
390 <td width='20%' class='base'>$Lang::tr{'guardian block httpd brute-force'}</td>
391 <td align='left'>on <input type='radio' name='GUARDIAN_ENABLE_HTTPD' value='on' $checked{'GUARDIAN_ENABLE_HTTPD'}{'on'} /> /
392 <input type='radio' name='GUARDIAN_ENABLE_HTTPD' value='off' $checked{'GUARDIAN_ENABLE_HTTPD'}{'off'} /> off</td>
395 # Display owncloud checkbox when the addon is installed.
396 if ( -e
"$owncloud_meta" ) {
398 print"<td width='20%' class='base'>$Lang::tr{'guardian block owncloud brute-force'}</td>\n";
399 print"<td align='left'>on <input type='radio' name='GUARDIAN_ENABLE_OWNCLOUD' value='on' $checked{'GUARDIAN_ENABLE_OWNCLOUD'}{'on'} /> /\n";
400 print"<input type='radio' name='GUARDIAN_ENABLE_OWNCLOUD' value='off' $checked{'GUARDIAN_ENABLE_OWNCLOUD'}{'off'} /> off</td>\n";
405 <td colspan='2'><br></td>
408 <td align='left' width='20%'>$Lang::tr{'guardian loglevel'}:</td>
409 <td><select name='GUARDIAN_LOGLEVEL'>
410 <option value='off' $selected{'GUARDIAN_LOGLEVEL'}{'off'}>off</option>
411 <option value='info' $selected{'GUARDIAN_LOGLEVEL'}{'info'}>info</option>
412 <option value='debug' $selected{'GUARDIAN_LOGLEVEL'}{'debug'}>debug</option>
416 <td colspan='2'><br></td>
419 <td align='left' width='20%'>$Lang::tr{'guardian priority level'}:</td>
420 <td><select name='GUARDIAN_PRIORITY_LEVEL'>
421 <option value='1' $selected{'GUARDIAN_PRIORITY_LEVEL'}{'1'}>1</option>
422 <option value='2' $selected{'GUARDIAN_PRIORITY_LEVEL'}{'2'}>2</option>
423 <option value='3' $selected{'GUARDIAN_PRIORITY_LEVEL'}{'3'}>3</option>
424 <option value='4' $selected{'GUARDIAN_PRIORITY_LEVEL'}{'4'}>4</option>
428 <td colspan='2'><br></td>
431 <td width='20%' class='base'>$Lang::tr{'guardian blockcount'}:</td>
432 <td><input type='text' name='GUARDIAN_BLOCKCOUNT' value='$settings{'GUARDIAN_BLOCKCOUNT'}' size='5' /></td>
435 <td width='20%' class='base'>$Lang::tr{'guardian blocktime'}:</td>
436 <td><input type='text' name='GUARDIAN_BLOCKTIME' value='$settings{'GUARDIAN_BLOCKTIME'}' size='10' /></td>
439 <td width='20%' class='base'>$Lang::tr{'guardian logfile'}:</td>
440 <td><input type='text' name='GUARDIAN_LOGFILE' value='$settings{'GUARDIAN_LOGFILE'}' size='30' /></td>
443 <td width='20%' class='base'>$Lang::tr{'guardian snort alertfile'}:</td>
444 <td><input type='text' name='GUARDIAN_SNORT_ALERTFILE' value='$settings{'GUARDIAN_SNORT_ALERTFILE'}' size='30' /></td>
455 <td align='center'><input type='submit' name='ACTION' value='$Lang::tr{'save'}' /></td>
465 # Function to show elements of the guardian ignorefile and allow to add or remove single members of it.
466 sub showIgnoreBox
() {
467 &Header
::openbox
('100%', 'center', $Lang::tr
{'guardian ignored hosts'});
472 <td colspan='2' class='base' bgcolor='$color{'color20'}'><b>$Lang::tr{'guardian ignored hosts'}</b></td>
475 # Check if the guardian ignore file contains any content.
476 if (-s
$ignorefile) {
478 # Open file and print contents.
479 open FILE
, $ignorefile or die "Could not open $ignorefile";
484 # Read file line by line and print out the elements.
485 while( my $ignored_element = <FILE
> ) {
487 # Increase id number for each element in the ignore file.
490 # Check if the id number is even or not.
492 $col="bgcolor='$color{'color22'}'";
494 $col="bgcolor='$color{'color20'}'";
499 <td width='80%' class='base' $col>$ignored_element</td>
500 <td width='20%' align='center' $col>
501 <form method='post' name='$id' action='$ENV{'SCRIPT_NAME'}'>
502 <input type='image' name='$Lang::tr{'remove'}' src='/images/delete.gif' title='$Lang::tr{'remove'}' alt='$Lang::tr{'remove'}'>
503 <input type='hidden' name='ID' value='$id'>
504 <input type='hidden' name='ACTION' value='$Lang::tr{'remove'}'>
512 # Print notice that currently no elements are stored in the ignore file.
514 print "<td class='base' colspan='2'>$Lang::tr{'guardian no entries'}</td>\n";
520 # Section to add new elements to the ignore list.
525 <form method='post' action='$ENV{'SCRIPT_NAME'}'>
527 <td width='30%'>$Lang::tr{'dnsforward add a new entry'}: </td>
528 <td width='50%'><input type='text' name='NEW_IGNORE_ENTRY' value='' size='24' /></td>
529 <td align='center' width='20%'><input type='submit' name='ACTION' value='$Lang::tr{'add'}' /></td>
539 # Function to list currently bocked addresses from guardian and unblock them or add custom entries to block.
540 sub showBlockedBox
() {
541 &Header
::openbox
('100%', 'center', $Lang::tr
{'guardian blocked hosts'});
546 <td colspan='2' class='base' bgcolor='$color{'color20'}'><b>$Lang::tr{'guardian blocked hosts'}</b></td>
550 # Lauch function to get the currently blocked hosts.
551 my @blocked_hosts = &GetBlockedHosts
();
556 # Loop through our blocked hosts array.
557 foreach my $blocked_host (@blocked_hosts) {
559 # Increase id number for each element in the ignore file.
562 # Check if the id number is even or not.
564 $col="bgcolor='$color{'color22'}'";
566 $col="bgcolor='$color{'color20'}'";
571 <td width='80%' class='base' $col><a href='/cgi-bin/ipinfo.cgi?ip=$blocked_host'>$blocked_host</a></td>
572 <td width='20%' align='center' $col>
573 <form method='post' name='frmb$id' action='$ENV{'SCRIPT_NAME'}'>
574 <input type='image' name='$Lang::tr{'unblock'}' src='/images/delete.gif' title='$Lang::tr{'unblock'}' alt='$Lang::tr{'unblock'}'>
575 <input type='hidden' name='ADDRESS_UNBLOCK' value='$blocked_host'>
576 <input type='hidden' name='ACTION' value='$Lang::tr{'unblock'}'>
583 # If the loop only has been runs once the id still is "0", which means there are no
584 # additional entries (blocked hosts) in the iptables chain.
587 # Print notice that currently no hosts are blocked.
589 print "<td class='base' colspan='2'>$Lang::tr{'guardian no entries'}</td>\n";
595 # Section for a manual block of an IP-address.
599 <table width='60%' border='0'>
600 <form method='post' action='$ENV{'SCRIPT_NAME'}'>
602 <td width='30%'>$Lang::tr{'guardian block a host'}: </td>
603 <td width='40%'><input type='text' name='ADDRESS_BLOCK' value='' size='24' /></td>
604 <td align='center' width='15%'><input type='submit' name='ACTION' value='$Lang::tr{'block'}'></td>
605 <td align='center' width='15%'><input type='submit' name='ACTION' value='$Lang::tr{'unblock all'}'></td>
615 &Header
::closebigbox
();
616 &Header
::closepage
();
618 # Function to check if guardian has been started.
619 # Grab process id and consumed memory if the daemon is running.
623 open(FILE
, '/usr/local/bin/addonctrl guardian status | ');
626 $string = join("", @guardian);
627 $string =~ s/[a-z_]//gi;
628 $string =~ s/\[[0-1]\;[0-9]+//gi;
629 $string =~ s/[\(\)\.]//gi;
632 @pid = split(/\s/,$string);
633 if (open(FILE
, "/proc/$pid[0]/statm")){
635 @memory = split(/ /,$temp);
641 sub GetBlockedHosts
() {
643 # Create new, empty array.
646 # Lauch helper to get chains from iptables.
647 open(FILE
, "/usr/local/bin/guardianctrl get-chain |");
649 # Read file line by line and print out the elements.
650 foreach my $line (<FILE
>) {
652 # Skip descriptive lines.
653 next if ($line =~ /^Chain/);
654 next if ($line =~ /^ pkts/);
656 # Generate array, based on the line content (seperator is a single or multiple space's)
657 my @comps = split(/\s{1,}/, $line);
658 my ($lead, $pkts, $bytes, $target, $prot, $opt, $in, $out, $source, $destination) = @comps;
660 # Assign different variable names.
661 my $blocked_host = $source;
663 # Add host to our hosts array.
664 push(@hosts, $blocked_host);
667 # Convert entries, sort them, write back and store the sorted entries into new array.
668 my @sorted = map { $_->[0] }
669 sort { $a->[1] <=> $b->[1] }
670 map { [$_, int sprintf("%03.f%03.f%03.f%03.f", split(/\./, $_))] }
673 # Return our sorted list.
677 sub BuildConfiguration
() {
679 &General
::readhash
("${General::swroot}/guardian/settings", \
%settings);
681 my $configfile = "${General::swroot}/guardian/guardian.conf";
683 # We set this to 1 (enabled) to prevent guardian from blocking the ISP gateway.
684 my $HostGatewayByte = "1";
686 # Open configfile for writing.
687 open(FILE
, ">$configfile");
689 print FILE
"EnableSnortMonitoring\t\t$settings{'GUARDIAN_ENABLE_SNORT'}\n";
690 print FILE
"EnableSSHMonitoring\t\t$settings{'GUARDIAN_ENABLE_SSH'}\n";
691 print FILE
"EnableHTTPDMonitoring\t\t$settings{'GUARDIAN_ENABLE_HTTPD'}\n";
693 # Check if owncloud settings should be written.
694 if (exists $settings{'GUARDIAN_ENABLE_OWNCLOUD'}) {
695 print FILE
"EnableOwncloudMonitoring\t$settings{'GUARDIAN_ENABLE_OWNCLOUD'}\n";
698 print FILE
"LogLevel\t\t\t$settings{'GUARDIAN_LOGLEVEL'}\n";
699 print FILE
"BlockCount\t\t\t$settings{'GUARDIAN_BLOCKCOUNT'}\n";
700 print FILE
"HostGatewayByte\t\t\t$HostGatewayByte\n";
701 print FILE
"LogFile\t\t\t\t$settings{'GUARDIAN_LOGFILE'}\n";
702 print FILE
"AlertFile\t\t\t$settings{'GUARDIAN_SNORT_ALERTFILE'}\n";
703 print FILE
"IgnoreFile\t\t\t$ignorefile\n";
704 print FILE
"TimeLimit\t\t\t$settings{'GUARDIAN_BLOCKTIME'}\n";
705 print FILE
"PriorityLevel\t\t\t$settings{'GUARDIAN_PRIORITY_LEVEL'}\n";
709 # Check if guardian should be started or stopped.
710 if($settings{'GUARDIAN_ENABLED'} eq 'on') {
712 # Call guardianctl to perform a reload.
713 system("/usr/local/bin/guardianctrl reload &>/dev/null");
716 system("/usr/local/bin/guardianctrl start &>/dev/null");
720 system("/usr/local/bin/guardianctrl stop &>/dev/null");