]>
git.ipfire.org Git - people/ummeegge/ipfire-2.x.git/blob - html/cgi-bin/ids.cgi
5 # This code is distributed under the terms of the GPL
7 # (c) The SmoothWall Team
12 use File
::Temp qw
/ tempfile tempdir /;
15 # enable only the following on debugging purpose
17 #use CGI::Carp 'fatalsToBrowser';
19 require '/var/ipfire/general-functions.pl';
20 require "${General::swroot}/lang.pl";
21 require "${General::swroot}/header.pl";
27 our $errormessage = '';
28 our $md5 = '0';# not '' to avoid displaying the wrong message when INSTALLMD5 not set
33 &General
::readhash
("${General::swroot}/ethernet/settings", \
%netsettings);
35 &Header
::showhttpheaders
();
37 $snortsettings{'ENABLE_SNORT'} = 'off';
38 $snortsettings{'ENABLE_SNORT_GREEN'} = 'off';
39 $snortsettings{'ENABLE_SNORT_BLUE'} = 'off';
40 $snortsettings{'ENABLE_SNORT_ORANGE'} = 'off';
41 $snortsettings{'ACTION'} = '';
42 $snortsettings{'RULES'} = '';
43 $snortsettings{'OINKCODE'} = '';
44 $snortsettings{'INSTALLDATE'} = '';
45 $snortsettings{'INSTALLMD5'} = '';
47 &Header
::getcgihash
(\
%snortsettings, {'wantfile' => 1, 'filevar' => 'FH'});
49 if ($snortsettings{'RULES'} eq 'subscripted') {
50 $url="http://www.snort.org/pub-bin/oinkmaster.cgi/$snortsettings{'OINKCODE'}/snortrules-snapshot-CURRENT_s.tar.gz";
51 } elsif ($snortsettings{'RULES'} eq 'registered') {
52 $url="http://www.snort.org/pub-bin/oinkmaster.cgi/$snortsettings{'OINKCODE'}/snortrules-snapshot-CURRENT.tar.gz";
53 } elsif ($snortsettings{'RULES'} eq 'bleeding') {
54 $url="http://www.bleedingsnort.com/bleeding.rules.tar.gz";
56 $url="http://www.snort.org/pub-bin/downloads.cgi/Download/comm_rules/Community-Rules-CURRENT.tar.gz";
59 if ($snortsettings{'ACTION'} eq $Lang::tr
{'save'})
61 $errormessage = $Lang::tr
{'invalid input for oink code'} unless (
62 ($snortsettings{'OINKCODE'} =~ /^[a-z0-9]+$/) ||
63 ($snortsettings{'RULESTYPE'} eq 'nothing' ) );
65 &General
::writehash
("${General::swroot}/snort/settings", \
%snortsettings);
66 if ($snortsettings{'ENABLE_SNORT'} eq 'on')
68 system ('/usr/bin/touch', "${General::swroot}/snort/enable");
70 unlink "${General::swroot}/snort/enable";
72 if ($snortsettings{'ENABLE_SNORT_GREEN'} eq 'on')
74 system ('/usr/bin/touch', "${General::swroot}/snort/enable_green");
76 unlink "${General::swroot}/snort/enable_green";
78 if ($snortsettings{'ENABLE_SNORT_BLUE'} eq 'on')
80 system ('/usr/bin/touch', "${General::swroot}/snort/enable_blue");
82 unlink "${General::swroot}/snort/enable_blue";
84 if ($snortsettings{'ENABLE_SNORT_ORANGE'} eq 'on')
86 system ('/usr/bin/touch', "${General::swroot}/snort/enable_orange");
88 unlink "${General::swroot}/snort/enable_orange";
91 system('/usr/local/bin/restartsnort','red','orange','blue','green');
93 # INSTALLMD5 is not in the form, so not retrieved by getcgihash
94 &General
::readhash
("${General::swroot}/snort/settings", \
%snortsettings);
97 if ($snortsettings{'ACTION'} eq $Lang::tr
{'download new ruleset'}) {
99 if (($snortsettings{'INSTALLMD5'} ne $md5) && defined $md5 ) {
101 my $filename = &downloadrulesfile
();
102 if (defined $filename) {
104 $realmd5 = `/usr/bin/md5sum $filename`;
106 $realmd5 =~ s/^(\w+)\s.*$/$1/;
107 if ($md5 ne $realmd5) {
108 $errormessage = "$Lang::tr{'invalid md5sum'}";
110 $results = "<b>$Lang::tr{'installed updates'}</b>\n<pre>";
111 $results .=`/usr/local/bin/oinkmaster.pl -s -u file://$filename -C /var/ipfire/snort/oinkmaster.conf -o /etc/snort/rules/ 2>&1`;
112 $results .= "</pre>";
119 $checked{'ENABLE_SNORT'}{'off'} = '';
120 $checked{'ENABLE_SNORT'}{'on'} = '';
121 $checked{'ENABLE_SNORT'}{$snortsettings{'ENABLE_SNORT'}} = "checked='checked'";
122 $checked{'ENABLE_SNORT_GREEN'}{'off'} = '';
123 $checked{'ENABLE_SNORT_GREEN'}{'on'} = '';
124 $checked{'ENABLE_SNORT_GREEN'}{$snortsettings{'ENABLE_SNORT_GREEN'}} = "checked='checked'";
125 $checked{'ENABLE_SNORT_BLUE'}{'off'} = '';
126 $checked{'ENABLE_SNORT_BLUE'}{'on'} = '';
127 $checked{'ENABLE_SNORT_BLUE'}{$snortsettings{'ENABLE_SNORT_BLUE'}} = "checked='checked'";
128 $checked{'ENABLE_SNORT_ORANGE'}{'off'} = '';
129 $checked{'ENABLE_SNORT_ORANGE'}{'on'} = '';
130 $checked{'ENABLE_SNORT_ORANGE'}{$snortsettings{'ENABLE_SNORT_ORANGE'}} = "checked='checked'";
131 $selected{'RULES'}{'nothing'} = '';
132 $selected{'RULES'}{'bleeding'} = '';
133 $selected{'RULES'}{'community'} = '';
134 $selected{'RULES'}{'registered'} = '';
135 $selected{'RULES'}{'subscripted'} = '';
136 $selected{'RULES'}{$snortsettings{'RULES'}} = "selected='selected'";
138 &Header
::openpage
($Lang::tr
{'intrusion detection system'}, 1, '');
140 &Header
::openbigbox
('100%', 'left', '', $errormessage);
143 &Header
::openbox
('100%', 'left', $Lang::tr
{'error messages'});
144 print "<class name='base'>$errormessage\n";
145 print " </class>\n";
149 &Header
::openbox
('100%', 'left', $Lang::tr
{'intrusion detection system2'});
151 <form method='post' action='$ENV{'SCRIPT_NAME'}'><table width='100%'>
153 <td class='base'><input type='checkbox' name='ENABLE_SNORT_GREEN' $checked{'ENABLE_SNORT_GREEN'}{'on'} />
158 if ($netsettings{'BLUE_DEV'} ne '') {
161 <td class='base'><input type='checkbox' name='ENABLE_SNORT_BLUE' $checked{'ENABLE_SNORT_BLUE'}{'on'} />
167 if ($netsettings{'ORANGE_DEV'} ne '') {
170 <td class='base'><input type='checkbox' name='ENABLE_SNORT_ORANGE' $checked{'ENABLE_SNORT_ORANGE'}{'on'} />
178 <td class='base'><input type='checkbox' name='ENABLE_SNORT' $checked{'ENABLE_SNORT'}{'on'} />
185 <td><b>$Lang::tr{'ids rules update'}</b></td>
188 <td><select name='RULES'>
189 <option value='nothing' $selected{'RULES'}{'nothing'} >$Lang::tr{'no'}</option>
190 <option value='bleeding' $selected{'RULES'}{'bleeding'} >$Lang::tr{'bleeding rules'}</option>
191 <option value='community' $selected{'RULES'}{'community'} >$Lang::tr{'community rules'}</option>
192 <option value='registered' $selected{'RULES'}{'registered'} >$Lang::tr{'registered user rules'}</option>
193 <option value='subscripted' $selected{'RULES'}{'subscripted'} >$Lang::tr{'subscripted user rules'}</option>
199 $Lang::tr{'ids rules license'} <a href='http://www.snort.org/' target='_blank'>http://www.snort.org</a>.<br />
201 $Lang::tr{'ids rules license2'} <a href='http://www.snort.org/reg-bin/userprefs.cgi' target='_blank'>USER PREFERENCES</a>, $Lang::tr{'ids rules license3'}<br />
205 <td nowrap='nowrap'>Oinkcode: <input type='text' size='40' name='OINKCODE' value='$snortsettings{'OINKCODE'}' /></td>
208 <td width='30%' align='center'><input type='submit' name='ACTION' value='$Lang::tr{'download new ruleset'}' />
212 if ($snortsettings{'INSTALLMD5'} eq $md5) {
213 print " $Lang::tr{'rules already up to date'}</td>";
215 if ( $snortsettings{'ACTION'} eq $Lang::tr
{'download new ruleset'} && $md5 eq $realmd5 ) {
216 $snortsettings{'INSTALLMD5'} = $realmd5;
217 $snortsettings{'INSTALLDATE'} = `/bin/date +'%Y-%m-%d'`;
218 &General
::writehash
("${General::swroot}/snort/settings", \
%snortsettings);
220 print " $Lang::tr{'updates installed'}: $snortsettings{'INSTALLDATE'}</td>";
228 <td width='55%'> </td>
229 <td width='40%' align='center'><input type='submit' name='ACTION' value='$Lang::tr{'save'}' /></td>
231 <!-- space for future online help link -->
239 if ($results ne '') {
244 &Header
::closebigbox
();
245 &Header
::closepage
();
248 # Retrieve MD5 sum from $url.md5 file
250 my $md5buf = &geturl
("$url.md5");
251 return undef unless $md5buf;
253 if (0) { # 1 to debug
256 ($fh, $filename) = tempfile
('/tmp/XXXXXXXX',SUFFIX
=> '.md5' );
258 syswrite ($fh, $md5buf->content);
261 return $md5buf->content;
263 sub downloadrulesfile
{
264 my $return = &geturl
($url);
265 return undef unless $return;
267 if (index($return->content, "\037\213") == -1 ) { # \037\213 is .gz beginning
268 $errormessage = $Lang::tr
{'invalid loaded file'};
274 ($fh, $filename) = tempfile
('/tmp/XXXXXXXX',SUFFIX
=> '.tar.gz' );#oinkmaster work only with this extension
276 syswrite ($fh, $return->content);
284 unless (-e
"${General::swroot}/red/active") {
285 $errormessage = $Lang::tr
{'could not download latest updates'};
289 my $downloader = LWP
::UserAgent
->new;
290 $downloader->timeout(5);
292 my %proxysettings=();
293 &General
::readhash
("${General::swroot}/proxy/settings", \
%proxysettings);
295 if ($_=$proxysettings{'UPSTREAM_PROXY'}) {
296 my ($peer, $peerport) = (/^(?:[a-zA-Z ]+\:\/\
/)?(?:[A-Za-z0-9\_\.\-]*?(?:\:[A-Za-z0-9\_\.\-]*?)?\@)?([a-zA-Z0-9\.\_\-]*?)(?:\:([0-9]{1,5}))?(?:\/.*?
)?
$/);
297 if ($proxysettings{'UPSTREAM_USER'}) {
298 $downloader->proxy("http","http://$proxysettings{'UPSTREAM_USER'}:$proxysettings{'UPSTREAM_PASSWORD'}@"."$peer:$peerport/");
300 $downloader->proxy("http","http://$peer:$peerport/");
304 my $return = $downloader->get($url,'Cache-Control','no-cache');
306 if ($return->code == 403) {
307 $errormessage = $Lang::tr
{'access refused with this oinkcode'};
309 } elsif (!$return->is_success()) {
310 $errormessage = $Lang::tr
{'could not download latest updates'};