]>
git.ipfire.org Git - people/pmueller/ipfire-2.x.git/blob - html/cgi-bin/proxy.cgi
2 ###############################################################################
4 # IPFire.org - A linux based firewall #
5 # Copyright (C) 2007-2013 IPFire Team <info@ipfire.org> #
7 # This program is free software: you can redistribute it and/or modify #
8 # it under the terms of the GNU General Public License as published by #
9 # the Free Software Foundation, either version 3 of the License, or #
10 # (at your option) any later version. #
12 # This program is distributed in the hope that it will be useful, #
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of #
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
15 # GNU General Public License for more details. #
17 # You should have received a copy of the GNU General Public License #
18 # along with this program. If not, see <http://www.gnu.org/licenses/>. #
20 ###############################################################################
22 # (c) 2004-2009 marco.s - http://www.advproxy.net
24 # This code is distributed under the terms of the GPL
26 # $Id: advproxy.cgi,v 3.0.2 2009/02/04 00:00:00 marco.s Exp $
32 # enable only the following on debugging purpose
34 #use CGI::Carp 'fatalsToBrowser';
36 require '/var/ipfire/general-functions.pl' ;
37 require "${General::swroot}/lang.pl" ;
38 require "${General::swroot}/header.pl" ;
40 my @squidversion = `/usr/sbin/squid -v` ;
45 my %mainsettings = ();
46 & General
:: readhash
( "${General::swroot}/main/settings" , \
%mainsettings );
47 & General
:: readhash
( "/srv/web/ipfire/html/themes/" . $mainsettings { 'THEME' }. "/include/colors.txt" , \
%color );
51 my %filtersettings =();
52 my %xlratorsettings =();
53 my %stdproxysettings =();
59 my @throttle_limits =( 64 , 128 , 256 , 384 , 512 , 768 , 1024 , 1280 , 1536 , 1792 , 2048 , 2560 , 3072 , 3584 , 4096 , 5120 , 6144 , 7168 , 8192 , 10240 , 12288 , 16384 , 20480 );
60 my $throttle_binary = "7z|arj|bin|bz2|cab|exe|gz|lzh|rar|sea|tar|tgz|xz|zip" ;
61 my $throttle_dskimg = "b5t|bin|bwt|ccd|cdi|cue|gho|img|iso|mds|nrg|pqi|vmdk" ;
62 my $throttle_mmedia = "aiff?|asf|avi|divx|mov|mp3|mpe?g|ogg|qt|ra?m|ts|vob" ;
64 my $def_ports_safe = "80 # http \n 21 # ftp \n 443 # https \n 563 # snews \n 70 # gopher \n 210 # wais \n 1025-65535 # unregistered ports \n 280 # http-mgmt \n 488 # gss-http \n 591 # filemaker \n 777 # multiling http \n 800 # Squids port (for icons) \n " ;
65 my $def_ports_ssl = "443 # https \n 563 # snews \n " ;
70 my $hintcolour = '#FFFFCC' ;
71 my $ncsa_buttontext = '' ;
86 my $browser_regexp = '' ;
90 my $acldir = "${General::swroot}/proxy/advanced/acls" ;
91 my $ncsadir = "${General::swroot}/proxy/advanced/ncsa" ;
92 my $ntlmdir = "${General::swroot}/proxy/advanced/ntlm" ;
93 my $raddir = "${General::swroot}/proxy/advanced/radius" ;
94 my $identdir = "${General::swroot}/proxy/advanced/ident" ;
95 my $credir = "${General::swroot}/proxy/advanced/cre" ;
97 my $userdb = " $ncsadir /passwd" ;
98 my $stdgrp = " $ncsadir /standard.grp" ;
99 my $extgrp = " $ncsadir /extended.grp" ;
100 my $disgrp = " $ncsadir /disabled.grp" ;
102 my $browserdb = "${General::swroot}/proxy/advanced/useragents" ;
103 my $mimetypes = "${General::swroot}/proxy/advanced/mimetypes" ;
104 my $throttled_urls = "${General::swroot}/proxy/advanced/throttle" ;
106 my $cre_enabled = "${General::swroot}/proxy/advanced/cre/enable" ;
107 my $cre_groups = "${General::swroot}/proxy/advanced/cre/classrooms" ;
108 my $cre_svhosts = "${General::swroot}/proxy/advanced/cre/supervisors" ;
110 my $identhosts = " $identdir /hosts" ;
112 my $authdir = "/usr/lib/squid/" ;
113 my $errordir = "/usr/lib/squid/errors" ;
115 my $acl_src_subnets = " $acldir /src_subnets.acl" ;
116 my $acl_src_banned_ip = " $acldir /src_banned_ip.acl" ;
117 my $acl_src_banned_mac = " $acldir /src_banned_mac.acl" ;
118 my $acl_src_unrestricted_ip = " $acldir /src_unrestricted_ip.acl" ;
119 my $acl_src_unrestricted_mac = " $acldir /src_unrestricted_mac.acl" ;
120 my $acl_src_noaccess_ip = " $acldir /src_noaccess_ip.acl" ;
121 my $acl_src_noaccess_mac = " $acldir /src_noaccess_mac.acl" ;
122 my $acl_dst_noauth = " $acldir /dst_noauth.acl" ;
123 my $acl_dst_noauth_dom = " $acldir /dst_noauth_dom.acl" ;
124 my $acl_dst_noauth_net = " $acldir /dst_noauth_net.acl" ;
125 my $acl_dst_noauth_url = " $acldir /dst_noauth_url.acl" ;
126 my $acl_dst_nocache = " $acldir /dst_nocache.acl" ;
127 my $acl_dst_nocache_dom = " $acldir /dst_nocache_dom.acl" ;
128 my $acl_dst_nocache_net = " $acldir /dst_nocache_net.acl" ;
129 my $acl_dst_nocache_url = " $acldir /dst_nocache_url.acl" ;
130 my $acl_dst_throttle = " $acldir /dst_throttle.acl" ;
131 my $acl_ports_safe = " $acldir /ports_safe.acl" ;
132 my $acl_ports_ssl = " $acldir /ports_ssl.acl" ;
133 my $acl_include = " $acldir /include.acl" ;
135 my $updaccelversion = 'n/a' ;
136 my $urlfilterversion = 'n/a' ;
138 unless (- d
" $acldir " ) { mkdir ( " $acldir " ); }
139 unless (- d
" $ncsadir " ) { mkdir ( " $ncsadir " ); }
140 unless (- d
" $ntlmdir " ) { mkdir ( " $ntlmdir " ); }
141 unless (- d
" $raddir " ) { mkdir ( " $raddir " ); }
142 unless (- d
" $identdir " ) { mkdir ( " $identdir " ); }
143 unless (- d
" $credir " ) { mkdir ( " $credir " ); }
145 unless (- e
$cre_groups ) { system ( "touch $cre_groups " ); }
146 unless (- e
$cre_svhosts ) { system ( "touch $cre_svhosts " ); }
148 unless (- e
$userdb ) { system ( "touch $userdb " ); }
149 unless (- e
$stdgrp ) { system ( "touch $stdgrp " ); }
150 unless (- e
$extgrp ) { system ( "touch $extgrp " ); }
151 unless (- e
$disgrp ) { system ( "touch $disgrp " ); }
153 unless (- e
$acl_src_subnets ) { system ( "touch $acl_src_subnets " ); }
154 unless (- e
$acl_src_banned_ip ) { system ( "touch $acl_src_banned_ip " ); }
155 unless (- e
$acl_src_banned_mac ) { system ( "touch $acl_src_banned_mac " ); }
156 unless (- e
$acl_src_unrestricted_ip ) { system ( "touch $acl_src_unrestricted_ip " ); }
157 unless (- e
$acl_src_unrestricted_mac ) { system ( "touch $acl_src_unrestricted_mac " ); }
158 unless (- e
$acl_src_noaccess_ip ) { system ( "touch $acl_src_noaccess_ip " ); }
159 unless (- e
$acl_src_noaccess_mac ) { system ( "touch $acl_src_noaccess_mac " ); }
160 unless (- e
$acl_dst_noauth ) { system ( "touch $acl_dst_noauth " ); }
161 unless (- e
$acl_dst_noauth_dom ) { system ( "touch $acl_dst_noauth_dom " ); }
162 unless (- e
$acl_dst_noauth_net ) { system ( "touch $acl_dst_noauth_net " ); }
163 unless (- e
$acl_dst_noauth_url ) { system ( "touch $acl_dst_noauth_url " ); }
164 unless (- e
$acl_dst_nocache ) { system ( "touch $acl_dst_nocache " ); }
165 unless (- e
$acl_dst_nocache_dom ) { system ( "touch $acl_dst_nocache_dom " ); }
166 unless (- e
$acl_dst_nocache_net ) { system ( "touch $acl_dst_nocache_net " ); }
167 unless (- e
$acl_dst_nocache_url ) { system ( "touch $acl_dst_nocache_url " ); }
168 unless (- e
$acl_dst_throttle ) { system ( "touch $acl_dst_throttle " ); }
169 unless (- e
$acl_ports_safe ) { system ( "touch $acl_ports_safe " ); }
170 unless (- e
$acl_ports_ssl ) { system ( "touch $acl_ports_ssl " ); }
171 unless (- e
$acl_include ) { system ( "touch $acl_include " ); }
173 unless (- e
$browserdb ) { system ( "touch $browserdb " ); }
174 unless (- e
$mimetypes ) { system ( "touch $mimetypes " ); }
176 my $HAVE_NTLM_AUTH = (- e
"/usr/bin/ntlm_auth" );
178 open FILE
, $browserdb ;
179 @useragentlist = sort { reverse ( substr ( reverse ( substr ( $a , index ( $a , ',' )+ 1 )), index ( reverse ( substr ( $a , index ( $a , ',' ))), ',' )+ 1 )) cmp reverse ( substr ( reverse ( substr ( $b , index ( $b , ',' )+ 1 )), index ( reverse ( substr ( $b , index ( $b , ',' ))), ',' )+ 1 ))} grep ! /(^$)|(^\s*#)/ ,< FILE
>;
182 & General
:: readhash
( "${General::swroot}/ethernet/settings" , \
%netsettings );
183 & General
:: readhash
( "${General::swroot}/main/settings" , \
%mainsettings );
185 my $green_cidr = & General
:: ipcidr
( " $netsettings {'GREEN_NETADDRESS'}\/ $netsettings {'GREEN_NETMASK'}" );
187 if (& Header
:: blue_used
() && $netsettings { 'BLUE_DEV' }) {
188 $blue_cidr = & General
:: ipcidr
( " $netsettings {'BLUE_NETADDRESS'}\/ $netsettings {'BLUE_NETMASK'}" );
191 & Header
:: showhttpheaders
();
193 $proxysettings { 'ACTION' } = '' ;
194 $proxysettings { 'VALID' } = '' ;
196 $proxysettings { 'ENABLE' } = 'off' ;
197 $proxysettings { 'ENABLE_BLUE' } = 'off' ;
198 $proxysettings { 'TRANSPARENT' } = 'off' ;
199 $proxysettings { 'TRANSPARENT_BLUE' } = 'off' ;
200 $proxysettings { 'PROXY_PORT' } = '800' ;
201 $proxysettings { 'TRANSPARENT_PORT' } = '3128' ;
202 $proxysettings { 'VISIBLE_HOSTNAME' } = '' ;
203 $proxysettings { 'ADMIN_MAIL_ADDRESS' } = '' ;
204 $proxysettings { 'ADMIN_PASSWORD' } = '' ;
205 $proxysettings { 'ERR_LANGUAGE' } = 'German' ;
206 $proxysettings { 'ERR_DESIGN' } = 'ipfire' ;
207 $proxysettings { 'SUPPRESS_VERSION' } = 'off' ;
208 $proxysettings { 'FORWARD_VIA' } = 'off' ;
209 $proxysettings { 'FORWARD_IPADDRESS' } = 'off' ;
210 $proxysettings { 'FORWARD_USERNAME' } = 'off' ;
211 $proxysettings { 'NO_CONNECTION_AUTH' } = 'off' ;
212 $proxysettings { 'UPSTREAM_PROXY' } = '' ;
213 $proxysettings { 'UPSTREAM_USER' } = '' ;
214 $proxysettings { 'UPSTREAM_PASSWORD' } = '' ;
215 $proxysettings { 'LOGGING' } = 'off' ;
216 $proxysettings { 'CACHEMGR' } = 'off' ;
217 $proxysettings { 'LOGQUERY' } = 'off' ;
218 $proxysettings { 'LOGUSERAGENT' } = 'off' ;
219 $proxysettings { 'FILEDESCRIPTORS' } = '16384' ;
220 $proxysettings { 'CACHE_MEM' } = '2' ;
221 $proxysettings { 'CACHE_SIZE' } = '50' ;
222 $proxysettings { 'MAX_SIZE' } = '4096' ;
223 $proxysettings { 'MIN_SIZE' } = '0' ;
224 $proxysettings { 'MEM_POLICY' } = 'LRU' ;
225 $proxysettings { 'CACHE_POLICY' } = 'LRU' ;
226 $proxysettings { 'L1_DIRS' } = '16' ;
227 $proxysettings { 'OFFLINE_MODE' } = 'off' ;
228 $proxysettings { 'CACHE_DIGESTS' } = 'off' ;
229 $proxysettings { 'CLASSROOM_EXT' } = 'off' ;
230 $proxysettings { 'SUPERVISOR_PASSWORD' } = '' ;
231 $proxysettings { 'NO_PROXY_LOCAL' } = 'off' ;
232 $proxysettings { 'NO_PROXY_LOCAL_BLUE' } = 'off' ;
233 $proxysettings { 'TIME_ACCESS_MODE' } = 'allow' ;
234 $proxysettings { 'TIME_FROM_HOUR' } = '00' ;
235 $proxysettings { 'TIME_FROM_MINUTE' } = '00' ;
236 $proxysettings { 'TIME_TO_HOUR' } = '24' ;
237 $proxysettings { 'TIME_TO_MINUTE' } = '00' ;
238 $proxysettings { 'MAX_OUTGOING_SIZE' } = '0' ;
239 $proxysettings { 'MAX_INCOMING_SIZE' } = '0' ;
240 $proxysettings { 'THROTTLING_GREEN_TOTAL' } = 'unlimited' ;
241 $proxysettings { 'THROTTLING_GREEN_HOST' } = 'unlimited' ;
242 $proxysettings { 'THROTTLING_BLUE_TOTAL' } = 'unlimited' ;
243 $proxysettings { 'THROTTLING_BLUE_HOST' } = 'unlimited' ;
244 $proxysettings { 'THROTTLE_BINARY' } = 'off' ;
245 $proxysettings { 'THROTTLE_DSKIMG' } = 'off' ;
246 $proxysettings { 'THROTTLE_MMEDIA' } = 'off' ;
247 $proxysettings { 'ENABLE_MIME_FILTER' } = 'off' ;
248 $proxysettings { 'ENABLE_BROWSER_CHECK' } = 'off' ;
249 $proxysettings { 'FAKE_USERAGENT' } = '' ;
250 $proxysettings { 'FAKE_REFERER' } = '' ;
251 $proxysettings { 'AUTH_METHOD' } = 'none' ;
252 $proxysettings { 'AUTH_REALM' } = '' ;
253 $proxysettings { 'AUTH_MAX_USERIP' } = '' ;
254 $proxysettings { 'AUTH_CACHE_TTL' } = '60' ;
255 $proxysettings { 'AUTH_IPCACHE_TTL' } = '0' ;
256 $proxysettings { 'AUTH_CHILDREN' } = '5' ;
257 $proxysettings { 'NCSA_MIN_PASS_LEN' } = '6' ;
258 $proxysettings { 'NCSA_BYPASS_REDIR' } = 'off' ;
259 $proxysettings { 'NCSA_USERNAME' } = '' ;
260 $proxysettings { 'NCSA_GROUP' } = '' ;
261 $proxysettings { 'NCSA_PASS' } = '' ;
262 $proxysettings { 'NCSA_PASS_CONFIRM' } = '' ;
263 $proxysettings { 'LDAP_BASEDN' } = '' ;
264 $proxysettings { 'LDAP_TYPE' } = 'ADS' ;
265 $proxysettings { 'LDAP_SERVER' } = '' ;
266 $proxysettings { 'LDAP_PORT' } = '389' ;
267 $proxysettings { 'LDAP_BINDDN_USER' } = '' ;
268 $proxysettings { 'LDAP_BINDDN_PASS' } = '' ;
269 $proxysettings { 'LDAP_GROUP' } = '' ;
270 $proxysettings { 'NTLM_AUTH_GROUP' } = '' ;
271 $proxysettings { 'NTLM_AUTH_BASIC' } = 'off' ;
272 $proxysettings { 'NTLM_DOMAIN' } = '' ;
273 $proxysettings { 'NTLM_PDC' } = '' ;
274 $proxysettings { 'NTLM_BDC' } = '' ;
275 $proxysettings { 'NTLM_ENABLE_ACL' } = 'off' ;
276 $proxysettings { 'NTLM_USER_ACL' } = 'positive' ;
277 $proxysettings { 'RADIUS_SERVER' } = '' ;
278 $proxysettings { 'RADIUS_PORT' } = '1812' ;
279 $proxysettings { 'RADIUS_IDENTIFIER' } = '' ;
280 $proxysettings { 'RADIUS_SECRET' } = '' ;
281 $proxysettings { 'RADIUS_ENABLE_ACL' } = 'off' ;
282 $proxysettings { 'RADIUS_USER_ACL' } = 'positive' ;
283 $proxysettings { 'IDENT_REQUIRED' } = 'off' ;
284 $proxysettings { 'IDENT_TIMEOUT' } = '10' ;
285 $proxysettings { 'IDENT_ENABLE_ACL' } = 'off' ;
286 $proxysettings { 'IDENT_USER_ACL' } = 'positive' ;
287 $proxysettings { 'ENABLE_FILTER' } = 'off' ;
288 $proxysettings { 'ENABLE_UPDXLRATOR' } = 'off' ;
289 $proxysettings { 'ENABLE_CLAMAV' } = 'off' ;
290 $proxysettings { 'CHILDREN' } = '10' ;
292 $ncsa_buttontext = $Lang :: tr
{ 'advproxy NCSA create user' };
294 & Header
:: getcgihash
( \
%proxysettings );
296 if ( $proxysettings { 'THROTTLING_GREEN_TOTAL' } eq 0 ) { $proxysettings { 'THROTTLING_GREEN_TOTAL' } = 'unlimited' ;}
297 if ( $proxysettings { 'THROTTLING_GREEN_HOST' } eq 0 ) { $proxysettings { 'THROTTLING_GREEN_HOST' } = 'unlimited' ;}
298 if ( $proxysettings { 'THROTTLING_BLUE_TOTAL' } eq 0 ) { $proxysettings { 'THROTTLING_BLUE_TOTAL' } = 'unlimited' ;}
299 if ( $proxysettings { 'THROTTLING_BLUE_HOST' } eq 0 ) { $proxysettings { 'THROTTLING_BLUE_HOST' } = 'unlimited' ;}
301 if ( $proxysettings { 'ACTION' } eq $Lang :: tr
{ 'advproxy NCSA user management' })
303 $proxysettings { 'NCSA_EDIT_MODE' } = 'yes' ;
306 if ( $proxysettings { 'ACTION' } eq $Lang :: tr
{ 'add' })
308 $proxysettings { 'NCSA_EDIT_MODE' } = 'yes' ;
309 if ( length ( $proxysettings { 'NCSA_PASS' }) < $proxysettings { 'NCSA_MIN_PASS_LEN' }) {
310 $errormessage = $Lang :: tr
{ 'advproxy errmsg password length 1' }. $proxysettings { 'NCSA_MIN_PASS_LEN' }. $Lang :: tr
{ 'advproxy errmsg password length 2' };
312 if (!( $proxysettings { 'NCSA_PASS' } eq $proxysettings { 'NCSA_PASS_CONFIRM' })) {
313 $errormessage = $Lang :: tr
{ 'advproxy errmsg passwords different' };
315 if ( $proxysettings { 'NCSA_USERNAME' } eq '' ) {
316 $errormessage = $Lang :: tr
{ 'advproxy errmsg no username' };
318 if (! $errormessage ) {
319 $proxysettings { 'NCSA_USERNAME' } =~ tr/A-Z/a-z/ ;
320 & adduser
( $proxysettings { 'NCSA_USERNAME' }, $proxysettings { 'NCSA_PASS' }, $proxysettings { 'NCSA_GROUP' });
322 $proxysettings { 'NCSA_USERNAME' } = '' ;
323 $proxysettings { 'NCSA_GROUP' } = '' ;
324 $proxysettings { 'NCSA_PASS' } = '' ;
325 $proxysettings { 'NCSA_PASS_CONFIRM' } = '' ;
328 if ( $proxysettings { 'ACTION' } eq $Lang :: tr
{ 'remove' })
330 $proxysettings { 'NCSA_EDIT_MODE' } = 'yes' ;
331 & deluser
( $proxysettings { 'ID' });
334 $checked { 'ENABLE_UPDXLRATOR' }{ 'off' } = '' ;
335 $checked { 'ENABLE_UPDXLRATOR' }{ 'on' } = '' ;
336 $checked { 'ENABLE_UPDXLRATOR' }{ $proxysettings { 'ENABLE_UPDXLRATOR' }} = "checked='checked'" ;
338 if ( $proxysettings { 'ACTION' } eq $Lang :: tr
{ 'edit' })
340 $proxysettings { 'NCSA_EDIT_MODE' } = 'yes' ;
341 $ncsa_buttontext = $Lang :: tr
{ 'advproxy NCSA update user' };
342 @temp = split ( /:/ , $proxysettings { 'ID' });
343 $proxysettings { 'NCSA_USERNAME' } = $temp [ 0 ];
344 $proxysettings { 'NCSA_GROUP' } = $temp [ 1 ];
345 $proxysettings { 'NCSA_PASS' } = "lEaVeAlOnE" ;
346 $proxysettings { 'NCSA_PASS_CONFIRM' } = $proxysettings { 'NCSA_PASS' };
349 if (( $proxysettings { 'ACTION' } eq $Lang :: tr
{ 'save' }) || ( $proxysettings { 'ACTION' } eq $Lang :: tr
{ 'advproxy save and restart' }) || ( $proxysettings { 'ACTION' } eq $Lang :: tr
{ 'proxy reconfigure' }))
351 if ( $proxysettings { 'ENABLE' } !~ /^(on|off)$/ ||
352 $proxysettings { 'TRANSPARENT' } !~ /^(on|off)$/ ||
353 $proxysettings { 'ENABLE_BLUE' } !~ /^(on|off)$/ ||
354 $proxysettings { 'TRANSPARENT_BLUE' } !~ /^(on|off)$/ ) {
355 $errormessage = $Lang :: tr
{ 'invalid input' };
358 if ( $proxysettings { 'CACHE_MEM' } > $proxysettings { 'CACHE_SIZE' } && $proxysettings { 'CACHE_SIZE' } > 0 ){
359 $errormessage = $Lang :: tr
{ 'advproxy errmsg cache' }. " " . $proxysettings { 'CACHE_MEM' }. " > " . $proxysettings { 'CACHE_SIZE' };
363 if (!(& General
:: validport
( $proxysettings { 'PROXY_PORT' })))
365 $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid proxy port' };
368 if (!(& General
:: validport
( $proxysettings { 'TRANSPARENT_PORT' })))
370 $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid proxy port' };
373 if ( $proxysettings { 'PROXY_PORT' } eq $proxysettings { 'TRANSPARENT_PORT' }) {
374 $errormessage = $Lang :: tr
{ 'advproxy errmsg proxy ports equal' };
377 if (!( $proxysettings { 'UPSTREAM_PROXY' } eq '' ))
379 my @temp = split ( /:/ , $proxysettings { 'UPSTREAM_PROXY' });
380 if (!(& General
:: validip
( $temp [ 0 ])))
382 if (!(& General
:: validdomainname
( $temp [ 0 ])))
384 $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid upstream proxy' };
389 if (!( $proxysettings { 'CACHE_SIZE' } =~ /^\d+/ ) ||
390 ( $proxysettings { 'CACHE_SIZE' } < 10 ))
392 if (!( $proxysettings { 'CACHE_SIZE' } eq '0' ))
394 $errormessage = $Lang :: tr
{ 'advproxy errmsg hdd cache size' };
398 if (!( $proxysettings { 'FILEDESCRIPTORS' } =~ /^\d+/ ) ||
399 ( $proxysettings { 'FILEDESCRIPTORS' } < 1 ) || ( $proxysettings { 'FILEDESCRIPTORS' } > 1048576 ))
401 $errormessage = $Lang :: tr
{ 'proxy errmsg filedescriptors' };
404 if (!( $proxysettings { 'CACHE_MEM' } =~ /^\d+/ ) ||
405 ( $proxysettings { 'CACHE_MEM' } < 1 ))
407 $errormessage = $Lang :: tr
{ 'advproxy errmsg mem cache size' };
410 my @free = `/usr/bin/free` ;
411 $free [ 1 ] =~ m/(\d+)/ ;
412 $cachemem = int $1 / 2048 ;
413 if ( $proxysettings { 'CACHE_MEM' } > $cachemem ) {
414 $proxysettings { 'CACHE_MEM' } = $cachemem ;
416 if (!( $proxysettings { 'MAX_SIZE' } =~ /^\d+/ ))
418 $errormessage = $Lang :: tr
{ 'invalid maximum object size' };
421 if (!( $proxysettings { 'MIN_SIZE' } =~ /^\d+/ ))
423 $errormessage = $Lang :: tr
{ 'invalid minimum object size' };
426 if (!( $proxysettings { 'MAX_OUTGOING_SIZE' } =~ /^\d+/ ))
428 $errormessage = $Lang :: tr
{ 'invalid maximum outgoing size' };
431 if (!( $proxysettings { 'TIME_TO_HOUR' }. $proxysettings { 'TIME_TO_MINUTE' } gt $proxysettings { 'TIME_FROM_HOUR' }. $proxysettings { 'TIME_FROM_MINUTE' }))
433 $errormessage = $Lang :: tr
{ 'advproxy errmsg time restriction' };
436 if (!( $proxysettings { 'MAX_INCOMING_SIZE' } =~ /^\d+/ ))
438 $errormessage = $Lang :: tr
{ 'invalid maximum incoming size' };
441 if (!( $proxysettings { 'CHILDREN' } =~ /^\d+$/ ) || ( $proxysettings { 'CHILDREN' } < 1 ))
443 $errormessage = $Lang :: tr
{ 'advproxy invalid num of children' };
446 if ( $proxysettings { 'ENABLE_BROWSER_CHECK' } eq 'on' )
448 $browser_regexp = '' ;
449 foreach ( @useragentlist )
452 @useragent = split ( /,/ );
453 if ( $proxysettings { 'UA_' . $useragent [ 0 ]} eq 'on' ) { $browser_regexp .= " $useragent [2]|" ; }
455 chop ( $browser_regexp );
456 if (! $browser_regexp )
458 $errormessage = $Lang :: tr
{ 'advproxy errmsg no browser' };
462 if (!( $proxysettings { 'AUTH_METHOD' } eq 'none' ))
464 unless (( $proxysettings { 'AUTH_METHOD' } eq 'ident' ) &&
465 ( $proxysettings { 'IDENT_REQUIRED' } eq 'off' ) &&
466 ( $proxysettings { 'IDENT_ENABLE_ACL' } eq 'off' ))
468 if ( $netsettings { 'BLUE_DEV' })
470 if ((( $proxysettings { 'ENABLE' } eq 'off' ) || ( $proxysettings { 'TRANSPARENT' } eq 'on' )) &&
471 (( $proxysettings { 'ENABLE_BLUE' } eq 'off' ) || ( $proxysettings { 'TRANSPARENT_BLUE' } eq 'on' )))
473 $errormessage = $Lang :: tr
{ 'advproxy errmsg non-transparent proxy required' };
477 if (( $proxysettings { 'ENABLE' } eq 'off' ) || ( $proxysettings { 'TRANSPARENT' } eq 'on' ))
479 $errormessage = $Lang :: tr
{ 'advproxy errmsg non-transparent proxy required' };
484 if ((!( $proxysettings { 'AUTH_MAX_USERIP' } eq '' )) &&
485 ((!( $proxysettings { 'AUTH_MAX_USERIP' } =~ /^\d+/ )) || ( $proxysettings { 'AUTH_MAX_USERIP' } < 1 ) || ( $proxysettings { 'AUTH_MAX_USERIP' } > 255 )))
487 $errormessage = $Lang :: tr
{ 'advproxy errmsg max userip' };
490 if (!( $proxysettings { 'AUTH_CACHE_TTL' } =~ /^\d+/ ))
492 $errormessage = $Lang :: tr
{ 'advproxy errmsg auth cache ttl' };
495 if (!( $proxysettings { 'AUTH_IPCACHE_TTL' } =~ /^\d+/ ))
497 $errormessage = $Lang :: tr
{ 'advproxy errmsg auth ipcache ttl' };
500 if ((!( $proxysettings { 'AUTH_MAX_USERIP' } eq '' )) && ( $proxysettings { 'AUTH_IPCACHE_TTL' } eq '0' ))
502 $errormessage = $Lang :: tr
{ 'advproxy errmsg auth ipcache may not be null' };
505 if ((!( $proxysettings { 'AUTH_CHILDREN' } =~ /^\d+/ )) || ( $proxysettings { 'AUTH_CHILDREN' } < 1 ) || ( $proxysettings { 'AUTH_CHILDREN' } > 255 ))
507 $errormessage = $Lang :: tr
{ 'advproxy errmsg auth children' };
511 if ( $proxysettings { 'AUTH_METHOD' } eq 'ncsa' )
513 if ((!( $proxysettings { 'NCSA_MIN_PASS_LEN' } =~ /^\d+/ )) || ( $proxysettings { 'NCSA_MIN_PASS_LEN' } < 1 ) || ( $proxysettings { 'NCSA_MIN_PASS_LEN' } > 255 ))
515 $errormessage = $Lang :: tr
{ 'advproxy errmsg password length' };
519 if ( $proxysettings { 'AUTH_METHOD' } eq 'ident' )
521 if ((!( $proxysettings { 'IDENT_TIMEOUT' } =~ /^\d+/ )) || ( $proxysettings { 'IDENT_TIMEOUT' } < 1 ))
523 $errormessage = $Lang :: tr
{ 'advproxy errmsg ident timeout' };
527 if ( $proxysettings { 'AUTH_METHOD' } eq 'ldap' )
529 if ( $proxysettings { 'LDAP_BASEDN' } eq '' )
531 $errormessage = $Lang :: tr
{ 'advproxy errmsg ldap base dn' };
534 if (!& General
:: validip
( $proxysettings { 'LDAP_SERVER' }))
536 if (!& General
:: validdomainname
( $proxysettings { 'LDAP_SERVER' }))
538 $errormessage = $Lang :: tr
{ 'advproxy errmsg ldap server' };
542 if (!& General
:: validport
( $proxysettings { 'LDAP_PORT' }))
544 $errormessage = $Lang :: tr
{ 'advproxy errmsg ldap port' };
547 if (( $proxysettings { 'LDAP_TYPE' } eq 'ADS' ) || ( $proxysettings { 'LDAP_TYPE' } eq 'NDS' ))
549 if (( $proxysettings { 'LDAP_BINDDN_USER' } eq '' ) || ( $proxysettings { 'LDAP_BINDDN_PASS' } eq '' ))
551 $errormessage = $Lang :: tr
{ 'advproxy errmsg ldap bind dn' };
556 if ( $proxysettings { 'AUTH_METHOD' } eq 'ntlm' )
558 if ( $proxysettings { 'NTLM_DOMAIN' } eq '' )
560 $errormessage = $Lang :: tr
{ 'advproxy errmsg ntlm domain' };
563 if ( $proxysettings { 'NTLM_PDC' } eq '' )
565 $errormessage = $Lang :: tr
{ 'advproxy errmsg ntlm pdc' };
568 if (!& General
:: validhostname
( $proxysettings { 'NTLM_PDC' }))
570 $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid pdc' };
573 if ((!( $proxysettings { 'NTLM_BDC' } eq '' )) && (!& General
:: validhostname
( $proxysettings { 'NTLM_BDC' })))
575 $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid bdc' };
579 $proxysettings { 'NTLM_DOMAIN' } = lc ( $proxysettings { 'NTLM_DOMAIN' });
580 $proxysettings { 'NTLM_PDC' } = lc ( $proxysettings { 'NTLM_PDC' });
581 $proxysettings { 'NTLM_BDC' } = lc ( $proxysettings { 'NTLM_BDC' });
583 if ( $proxysettings { 'AUTH_METHOD' } eq 'radius' )
585 if (!& General
:: validip
( $proxysettings { 'RADIUS_SERVER' }))
587 $errormessage = $Lang :: tr
{ 'advproxy errmsg radius server' };
590 if (!& General
:: validport
( $proxysettings { 'RADIUS_PORT' }))
592 $errormessage = $Lang :: tr
{ 'advproxy errmsg radius port' };
595 if ( $proxysettings { 'RADIUS_SECRET' } eq '' )
597 $errormessage = $Lang :: tr
{ 'advproxy errmsg radius secret' };
602 # Quick parent proxy error checking of username and password info. If username password don't both exist give an error.
605 if (( $proxysettings { 'UPSTREAM_USER' } eq '' )) { $proxy1 = '' ;}
606 if (( $proxysettings { 'UPSTREAM_PASSWORD' } eq '' )) { $proxy2 = '' ;}
607 if ( $proxysettings { 'UPSTREAM_USER' } eq 'PASS' ) { $proxy1 = $proxy2 = 'PASS' ; $proxysettings { 'UPSTREAM_PASSWORD' } = '' ;}
608 if (( $proxy1 ne $proxy2 ))
610 $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid upstream proxy username or password setting' };
618 $proxysettings { 'VALID' } = 'no' ; }
620 $proxysettings { 'VALID' } = 'yes' ; }
622 if ( $proxysettings { 'VALID' } eq 'yes' )
626 delete $proxysettings { 'SRC_SUBNETS' };
627 delete $proxysettings { 'SRC_BANNED_IP' };
628 delete $proxysettings { 'SRC_BANNED_MAC' };
629 delete $proxysettings { 'SRC_UNRESTRICTED_IP' };
630 delete $proxysettings { 'SRC_UNRESTRICTED_MAC' };
631 delete $proxysettings { 'DST_NOCACHE' };
632 delete $proxysettings { 'DST_NOAUTH' };
633 delete $proxysettings { 'PORTS_SAFE' };
634 delete $proxysettings { 'PORTS_SSL' };
635 delete $proxysettings { 'MIME_TYPES' };
636 delete $proxysettings { 'NTLM_ALLOW_USERS' };
637 delete $proxysettings { 'NTLM_DENY_USERS' };
638 delete $proxysettings { 'RADIUS_ALLOW_USERS' };
639 delete $proxysettings { 'RADIUS_DENY_USERS' };
640 delete $proxysettings { 'IDENT_HOSTS' };
641 delete $proxysettings { 'IDENT_ALLOW_USERS' };
642 delete $proxysettings { 'IDENT_DENY_USERS' };
644 delete $proxysettings { 'CRE_GROUPS' };
645 delete $proxysettings { 'CRE_SVHOSTS' };
647 delete $proxysettings { 'NCSA_USERNAME' };
648 delete $proxysettings { 'NCSA_GROUP' };
649 delete $proxysettings { 'NCSA_PASS' };
650 delete $proxysettings { 'NCSA_PASS_CONFIRM' };
652 $proxysettings { 'TIME_MON' } = 'off' unless exists $proxysettings { 'TIME_MON' };
653 $proxysettings { 'TIME_TUE' } = 'off' unless exists $proxysettings { 'TIME_TUE' };
654 $proxysettings { 'TIME_WED' } = 'off' unless exists $proxysettings { 'TIME_WED' };
655 $proxysettings { 'TIME_THU' } = 'off' unless exists $proxysettings { 'TIME_THU' };
656 $proxysettings { 'TIME_FRI' } = 'off' unless exists $proxysettings { 'TIME_FRI' };
657 $proxysettings { 'TIME_SAT' } = 'off' unless exists $proxysettings { 'TIME_SAT' };
658 $proxysettings { 'TIME_SUN' } = 'off' unless exists $proxysettings { 'TIME_SUN' };
660 $proxysettings { 'AUTH_ALWAYS_REQUIRED' } = 'off' unless exists $proxysettings { 'AUTH_ALWAYS_REQUIRED' };
661 $proxysettings { 'NTLM_ENABLE_INT_AUTH' } = 'off' unless exists $proxysettings { 'NTLM_ENABLE_INT_AUTH' };
663 & General
:: writehash
( "${General::swroot}/proxy/advanced/settings" , \
%proxysettings );
665 if (- e
"${General::swroot}/proxy/settings" ) { & General
:: readhash
( "${General::swroot}/proxy/settings" , \
%stdproxysettings ); }
666 $stdproxysettings { 'PROXY_PORT' } = $proxysettings { 'PROXY_PORT' };
667 $stdproxysettings { 'UPSTREAM_PROXY' } = $proxysettings { 'UPSTREAM_PROXY' };
668 $stdproxysettings { 'UPSTREAM_USER' } = $proxysettings { 'UPSTREAM_USER' };
669 $stdproxysettings { 'UPSTREAM_PASSWORD' } = $proxysettings { 'UPSTREAM_PASSWORD' };
670 $stdproxysettings { 'ENABLE_FILTER' } = $proxysettings { 'ENABLE_FILTER' };
671 $stdproxysettings { 'ENABLE_UPDXLRATOR' } = $proxysettings { 'ENABLE_UPDXLRATOR' };
672 $stdproxysettings { 'ENABLE_CLAMAV' } = $proxysettings { 'ENABLE_CLAMAV' };
673 & General
:: writehash
( "${General::swroot}/proxy/settings" , \
%stdproxysettings );
678 if ( $proxysettings { 'CACHEMGR' } eq 'on' ){& writecachemgr
;}
680 system ( '/usr/local/bin/squidctrl' , 'disable' );
681 unlink "${General::swroot}/proxy/enable" ;
682 unlink "${General::swroot}/proxy/transparent" ;
683 unlink "${General::swroot}/proxy/enable_blue" ;
684 unlink "${General::swroot}/proxy/transparent_blue" ;
686 if ( $proxysettings { 'ENABLE' } eq 'on' ) {
687 system ( '/usr/bin/touch' , "${General::swroot}/proxy/enable" );
688 system ( '/usr/local/bin/squidctrl' , 'enable' ); }
689 if ( $proxysettings { 'TRANSPARENT' } eq 'on' && $proxysettings { 'ENABLE' } eq 'on' ) {
690 system ( '/usr/bin/touch' , "${General::swroot}/proxy/transparent" ); }
691 if ( $proxysettings { 'ENABLE_BLUE' } eq 'on' ) {
692 system ( '/usr/bin/touch' , "${General::swroot}/proxy/enable_blue" );
693 system ( '/usr/local/bin/squidctrl' , 'enable' ); }
694 if ( $proxysettings { 'TRANSPARENT_BLUE' } eq 'on' && $proxysettings { 'ENABLE_BLUE' } eq 'on' ) {
695 system ( '/usr/bin/touch' , "${General::swroot}/proxy/transparent_blue" ); }
697 if ( $proxysettings { 'ACTION' } eq $Lang :: tr
{ 'advproxy save and restart' }) { system ( '/usr/local/bin/squidctrl restart >/dev/null 2>&1' ); }
698 if ( $proxysettings { 'ACTION' } eq $Lang :: tr
{ 'proxy reconfigure' }) { system ( '/usr/local/bin/squidctrl reconfigure >/dev/null 2>&1' ); }
702 if ( $proxysettings { 'ACTION' } eq $Lang :: tr
{ 'advproxy clear cache' })
704 system ( '/usr/local/bin/squidctrl flush >/dev/null 2>&1' );
709 if (- e
"${General::swroot}/proxy/advanced/settings" ) {
710 & General
:: readhash
( "${General::swroot}/proxy/advanced/settings" , \
%proxysettings );
711 } elsif (- e
"${General::swroot}/proxy/settings" ) {
712 & General
:: readhash
( "${General::swroot}/proxy/settings" , \
%proxysettings );
717 # ------------------------------------------------------------------
719 # Hook to regenerate the configuration files, if cgi got called from command line.
720 if ( $ENV { "REMOTE_ADDR" } eq "" ) {
725 # -------------------------------------------------------------------
727 $checked { 'ENABLE' }{ 'off' } = '' ;
728 $checked { 'ENABLE' }{ 'on' } = '' ;
729 $checked { 'ENABLE' }{ $proxysettings { 'ENABLE' }} = "checked='checked'" ;
731 $checked { 'TRANSPARENT' }{ 'off' } = '' ;
732 $checked { 'TRANSPARENT' }{ 'on' } = '' ;
733 $checked { 'TRANSPARENT' }{ $proxysettings { 'TRANSPARENT' }} = "checked='checked'" ;
735 $checked { 'ENABLE_BLUE' }{ 'off' } = '' ;
736 $checked { 'ENABLE_BLUE' }{ 'on' } = '' ;
737 $checked { 'ENABLE_BLUE' }{ $proxysettings { 'ENABLE_BLUE' }} = "checked='checked'" ;
739 $checked { 'TRANSPARENT_BLUE' }{ 'off' } = '' ;
740 $checked { 'TRANSPARENT_BLUE' }{ 'on' } = '' ;
741 $checked { 'TRANSPARENT_BLUE' }{ $proxysettings { 'TRANSPARENT_BLUE' }} = "checked='checked'" ;
743 $checked { 'SUPPRESS_VERSION' }{ 'off' } = '' ;
744 $checked { 'SUPPRESS_VERSION' }{ 'on' } = '' ;
745 $checked { 'SUPPRESS_VERSION' }{ $proxysettings { 'SUPPRESS_VERSION' }} = "checked='checked'" ;
747 $checked { 'FORWARD_IPADDRESS' }{ 'off' } = '' ;
748 $checked { 'FORWARD_IPADDRESS' }{ 'on' } = '' ;
749 $checked { 'FORWARD_IPADDRESS' }{ $proxysettings { 'FORWARD_IPADDRESS' }} = "checked='checked'" ;
750 $checked { 'FORWARD_USERNAME' }{ 'off' } = '' ;
751 $checked { 'FORWARD_USERNAME' }{ 'on' } = '' ;
752 $checked { 'FORWARD_USERNAME' }{ $proxysettings { 'FORWARD_USERNAME' }} = "checked='checked'" ;
753 $checked { 'FORWARD_VIA' }{ 'off' } = '' ;
754 $checked { 'FORWARD_VIA' }{ 'on' } = '' ;
755 $checked { 'FORWARD_VIA' }{ $proxysettings { 'FORWARD_VIA' }} = "checked='checked'" ;
756 $checked { 'NO_CONNECTION_AUTH' }{ 'off' } = '' ;
757 $checked { 'NO_CONNECTION_AUTH' }{ 'on' } = '' ;
758 $checked { 'NO_CONNECTION_AUTH' }{ $proxysettings { 'NO_CONNECTION_AUTH' }} = "checked='checked'" ;
760 $selected { 'MEM_POLICY' }{ $proxysettings { 'MEM_POLICY' }} = "selected='selected'" ;
761 $selected { 'CACHE_POLICY' }{ $proxysettings { 'CACHE_POLICY' }} = "selected='selected'" ;
762 $selected { 'L1_DIRS' }{ $proxysettings { 'L1_DIRS' }} = "selected='selected'" ;
763 $checked { 'OFFLINE_MODE' }{ 'off' } = '' ;
764 $checked { 'OFFLINE_MODE' }{ 'on' } = '' ;
765 $checked { 'OFFLINE_MODE' }{ $proxysettings { 'OFFLINE_MODE' }} = "checked='checked'" ;
766 $checked { 'CACHE_DIGESTS' }{ 'off' } = '' ;
767 $checked { 'CACHE_DIGESTS' }{ 'on' } = '' ;
768 $checked { 'CACHE_DIGESTS' }{ $proxysettings { 'CACHE_DIGESTS' }} = "checked='checked'" ;
770 $checked { 'LOGGING' }{ 'off' } = '' ;
771 $checked { 'LOGGING' }{ 'on' } = '' ;
772 $checked { 'LOGGING' }{ $proxysettings { 'LOGGING' }} = "checked='checked'" ;
773 $checked { 'CACHEMGR' }{ 'off' } = '' ;
774 $checked { 'CACHEMGR' }{ 'on' } = '' ;
775 $checked { 'CACHEMGR' }{ $proxysettings { 'CACHEMGR' }} = "checked='checked'" ;
776 $checked { 'LOGQUERY' }{ 'off' } = '' ;
777 $checked { 'LOGQUERY' }{ 'on' } = '' ;
778 $checked { 'LOGQUERY' }{ $proxysettings { 'LOGQUERY' }} = "checked='checked'" ;
779 $checked { 'LOGUSERAGENT' }{ 'off' } = '' ;
780 $checked { 'LOGUSERAGENT' }{ 'on' } = '' ;
781 $checked { 'LOGUSERAGENT' }{ $proxysettings { 'LOGUSERAGENT' }} = "checked='checked'" ;
783 $selected { 'ERR_LANGUAGE' }{ $proxysettings { 'ERR_LANGUAGE' }} = "selected='selected'" ;
784 $selected { 'ERR_DESIGN' }{ $proxysettings { 'ERR_DESIGN' }} = "selected='selected'" ;
786 $checked { 'NO_PROXY_LOCAL' }{ 'off' } = '' ;
787 $checked { 'NO_PROXY_LOCAL' }{ 'on' } = '' ;
788 $checked { 'NO_PROXY_LOCAL' }{ $proxysettings { 'NO_PROXY_LOCAL' }} = "checked='checked'" ;
789 $checked { 'NO_PROXY_LOCAL_BLUE' }{ 'off' } = '' ;
790 $checked { 'NO_PROXY_LOCAL_BLUE' }{ 'on' } = '' ;
791 $checked { 'NO_PROXY_LOCAL_BLUE' }{ $proxysettings { 'NO_PROXY_LOCAL_BLUE' }} = "checked='checked'" ;
793 $checked { 'CLASSROOM_EXT' }{ 'off' } = '' ;
794 $checked { 'CLASSROOM_EXT' }{ 'on' } = '' ;
795 $checked { 'CLASSROOM_EXT' }{ $proxysettings { 'CLASSROOM_EXT' }} = "checked='checked'" ;
797 $selected { 'TIME_ACCESS_MODE' }{ $proxysettings { 'TIME_ACCESS_MODE' }} = "selected='selected'" ;
798 $selected { 'TIME_FROM_HOUR' }{ $proxysettings { 'TIME_FROM_HOUR' }} = "selected='selected'" ;
799 $selected { 'TIME_FROM_MINUTE' }{ $proxysettings { 'TIME_FROM_MINUTE' }} = "selected='selected'" ;
800 $selected { 'TIME_TO_HOUR' }{ $proxysettings { 'TIME_TO_HOUR' }} = "selected='selected'" ;
801 $selected { 'TIME_TO_MINUTE' }{ $proxysettings { 'TIME_TO_MINUTE' }} = "selected='selected'" ;
803 $proxysettings { 'TIME_MON' } = 'on' unless exists $proxysettings { 'TIME_MON' };
804 $proxysettings { 'TIME_TUE' } = 'on' unless exists $proxysettings { 'TIME_TUE' };
805 $proxysettings { 'TIME_WED' } = 'on' unless exists $proxysettings { 'TIME_WED' };
806 $proxysettings { 'TIME_THU' } = 'on' unless exists $proxysettings { 'TIME_THU' };
807 $proxysettings { 'TIME_FRI' } = 'on' unless exists $proxysettings { 'TIME_FRI' };
808 $proxysettings { 'TIME_SAT' } = 'on' unless exists $proxysettings { 'TIME_SAT' };
809 $proxysettings { 'TIME_SUN' } = 'on' unless exists $proxysettings { 'TIME_SUN' };
811 $checked { 'TIME_MON' }{ 'off' } = '' ;
812 $checked { 'TIME_MON' }{ 'on' } = '' ;
813 $checked { 'TIME_MON' }{ $proxysettings { 'TIME_MON' }} = "checked='checked'" ;
814 $checked { 'TIME_TUE' }{ 'off' } = '' ;
815 $checked { 'TIME_TUE' }{ 'on' } = '' ;
816 $checked { 'TIME_TUE' }{ $proxysettings { 'TIME_TUE' }} = "checked='checked'" ;
817 $checked { 'TIME_WED' }{ 'off' } = '' ;
818 $checked { 'TIME_WED' }{ 'on' } = '' ;
819 $checked { 'TIME_WED' }{ $proxysettings { 'TIME_WED' }} = "checked='checked'" ;
820 $checked { 'TIME_THU' }{ 'off' } = '' ;
821 $checked { 'TIME_THU' }{ 'on' } = '' ;
822 $checked { 'TIME_THU' }{ $proxysettings { 'TIME_THU' }} = "checked='checked'" ;
823 $checked { 'TIME_FRI' }{ 'off' } = '' ;
824 $checked { 'TIME_FRI' }{ 'on' } = '' ;
825 $checked { 'TIME_FRI' }{ $proxysettings { 'TIME_FRI' }} = "checked='checked'" ;
826 $checked { 'TIME_SAT' }{ 'off' } = '' ;
827 $checked { 'TIME_SAT' }{ 'on' } = '' ;
828 $checked { 'TIME_SAT' }{ $proxysettings { 'TIME_SAT' }} = "checked='checked'" ;
829 $checked { 'TIME_SUN' }{ 'off' } = '' ;
830 $checked { 'TIME_SUN' }{ 'on' } = '' ;
831 $checked { 'TIME_SUN' }{ $proxysettings { 'TIME_SUN' }} = "checked='checked'" ;
833 $selected { 'THROTTLING_GREEN_TOTAL' }{ $proxysettings { 'THROTTLING_GREEN_TOTAL' }} = "selected='selected'" ;
834 $selected { 'THROTTLING_GREEN_HOST' }{ $proxysettings { 'THROTTLING_GREEN_HOST' }} = "selected='selected'" ;
835 $selected { 'THROTTLING_BLUE_TOTAL' }{ $proxysettings { 'THROTTLING_BLUE_TOTAL' }} = "selected='selected'" ;
836 $selected { 'THROTTLING_BLUE_HOST' }{ $proxysettings { 'THROTTLING_BLUE_HOST' }} = "selected='selected'" ;
838 $checked { 'THROTTLE_BINARY' }{ 'off' } = '' ;
839 $checked { 'THROTTLE_BINARY' }{ 'on' } = '' ;
840 $checked { 'THROTTLE_BINARY' }{ $proxysettings { 'THROTTLE_BINARY' }} = "checked='checked'" ;
841 $checked { 'THROTTLE_DSKIMG' }{ 'off' } = '' ;
842 $checked { 'THROTTLE_DSKIMG' }{ 'on' } = '' ;
843 $checked { 'THROTTLE_DSKIMG' }{ $proxysettings { 'THROTTLE_DSKIMG' }} = "checked='checked'" ;
844 $checked { 'THROTTLE_MMEDIA' }{ 'off' } = '' ;
845 $checked { 'THROTTLE_MMEDIA' }{ 'on' } = '' ;
846 $checked { 'THROTTLE_MMEDIA' }{ $proxysettings { 'THROTTLE_MMEDIA' }} = "checked='checked'" ;
848 $checked { 'ENABLE_MIME_FILTER' }{ 'off' } = '' ;
849 $checked { 'ENABLE_MIME_FILTER' }{ 'on' } = '' ;
850 $checked { 'ENABLE_MIME_FILTER' }{ $proxysettings { 'ENABLE_MIME_FILTER' }} = "checked='checked'" ;
852 $checked { 'ENABLE_BROWSER_CHECK' }{ 'off' } = '' ;
853 $checked { 'ENABLE_BROWSER_CHECK' }{ 'on' } = '' ;
854 $checked { 'ENABLE_BROWSER_CHECK' }{ $proxysettings { 'ENABLE_BROWSER_CHECK' }} = "checked='checked'" ;
856 foreach ( @useragentlist ) {
857 @useragent = split ( /,/ );
858 $checked { 'UA_' . $useragent [ 0 ]}{ 'off' } = '' ;
859 $checked { 'UA_' . $useragent [ 0 ]}{ 'on' } = '' ;
860 $checked { 'UA_' . $useragent [ 0 ]}{ $proxysettings { 'UA_' . $useragent [ 0 ]}} = "checked='checked'" ;
863 $checked { 'AUTH_METHOD' }{ 'none' } = '' ;
864 $checked { 'AUTH_METHOD' }{ 'ncsa' } = '' ;
865 $checked { 'AUTH_METHOD' }{ 'ident' } = '' ;
866 $checked { 'AUTH_METHOD' }{ 'ldap' } = '' ;
867 $checked { 'AUTH_METHOD' }{ 'ntlm' } = '' ;
868 $checked { 'AUTH_METHOD' }{ 'ntlm-auth' } = '' ;
869 $checked { 'AUTH_METHOD' }{ 'radius' } = '' ;
870 $checked { 'AUTH_METHOD' }{ $proxysettings { 'AUTH_METHOD' }} = "checked='checked'" ;
872 $proxysettings { 'AUTH_ALWAYS_REQUIRED' } = 'on' unless exists $proxysettings { 'AUTH_ALWAYS_REQUIRED' };
874 $checked { 'AUTH_ALWAYS_REQUIRED' }{ 'off' } = '' ;
875 $checked { 'AUTH_ALWAYS_REQUIRED' }{ 'on' } = '' ;
876 $checked { 'AUTH_ALWAYS_REQUIRED' }{ $proxysettings { 'AUTH_ALWAYS_REQUIRED' }} = "checked='checked'" ;
878 $checked { 'NCSA_BYPASS_REDIR' }{ 'off' } = '' ;
879 $checked { 'NCSA_BYPASS_REDIR' }{ 'on' } = '' ;
880 $checked { 'NCSA_BYPASS_REDIR' }{ $proxysettings { 'NCSA_BYPASS_REDIR' }} = "checked='checked'" ;
882 $selected { 'NCSA_GROUP' }{ $proxysettings { 'NCSA_GROUP' }} = "selected='selected'" ;
884 $selected { 'LDAP_TYPE' }{ $proxysettings { 'LDAP_TYPE' }} = "selected='selected'" ;
886 $proxysettings { 'NTLM_ENABLE_INT_AUTH' } = 'on' unless exists $proxysettings { 'NTLM_ENABLE_INT_AUTH' };
888 $checked { 'NTLM_ENABLE_INT_AUTH' }{ 'off' } = '' ;
889 $checked { 'NTLM_ENABLE_INT_AUTH' }{ 'on' } = '' ;
890 $checked { 'NTLM_ENABLE_INT_AUTH' }{ $proxysettings { 'NTLM_ENABLE_INT_AUTH' }} = "checked='checked'" ;
892 $checked { 'NTLM_ENABLE_ACL' }{ 'off' } = '' ;
893 $checked { 'NTLM_ENABLE_ACL' }{ 'on' } = '' ;
894 $checked { 'NTLM_ENABLE_ACL' }{ $proxysettings { 'NTLM_ENABLE_ACL' }} = "checked='checked'" ;
896 $checked { 'NTLM_USER_ACL' }{ 'positive' } = '' ;
897 $checked { 'NTLM_USER_ACL' }{ 'negative' } = '' ;
898 $checked { 'NTLM_USER_ACL' }{ $proxysettings { 'NTLM_USER_ACL' }} = "checked='checked'" ;
900 $checked { 'NTLM_AUTH_BASIC' }{ 'on' } = '' ;
901 $checked { 'NTLM_AUTH_BASIC' }{ 'off' } = '' ;
902 $checked { 'NTLM_AUTH_BASIC' }{ $proxysettings { 'NTLM_AUTH_BASIC' }} = "checked='checked'" ;
904 $checked { 'RADIUS_ENABLE_ACL' }{ 'off' } = '' ;
905 $checked { 'RADIUS_ENABLE_ACL' }{ 'on' } = '' ;
906 $checked { 'RADIUS_ENABLE_ACL' }{ $proxysettings { 'RADIUS_ENABLE_ACL' }} = "checked='checked'" ;
908 $checked { 'RADIUS_USER_ACL' }{ 'positive' } = '' ;
909 $checked { 'RADIUS_USER_ACL' }{ 'negative' } = '' ;
910 $checked { 'RADIUS_USER_ACL' }{ $proxysettings { 'RADIUS_USER_ACL' }} = "checked='checked'" ;
912 $checked { 'IDENT_REQUIRED' }{ 'off' } = '' ;
913 $checked { 'IDENT_REQUIRED' }{ 'on' } = '' ;
914 $checked { 'IDENT_REQUIRED' }{ $proxysettings { 'IDENT_REQUIRED' }} = "checked='checked'" ;
916 $checked { 'IDENT_ENABLE_ACL' }{ 'off' } = '' ;
917 $checked { 'IDENT_ENABLE_ACL' }{ 'on' } = '' ;
918 $checked { 'IDENT_ENABLE_ACL' }{ $proxysettings { 'IDENT_ENABLE_ACL' }} = "checked='checked'" ;
920 $checked { 'IDENT_USER_ACL' }{ 'positive' } = '' ;
921 $checked { 'IDENT_USER_ACL' }{ 'negative' } = '' ;
922 $checked { 'IDENT_USER_ACL' }{ $proxysettings { 'IDENT_USER_ACL' }} = "checked='checked'" ;
924 $checked { 'ENABLE_FILTER' }{ 'off' } = '' ;
925 $checked { 'ENABLE_FILTER' }{ 'on' } = '' ;
926 $checked { 'ENABLE_FILTER' }{ $proxysettings { 'ENABLE_FILTER' }} = "checked='checked'" ;
928 $checked { 'ENABLE_UPDXLRATOR' }{ 'off' } = '' ;
929 $checked { 'ENABLE_UPDXLRATOR' }{ 'on' } = '' ;
930 $checked { 'ENABLE_UPDXLRATOR' }{ $proxysettings { 'ENABLE_UPDXLRATOR' }} = "checked='checked'" ;
932 $checked { 'ENABLE_CLAMAV' }{ 'off' } = '' ;
933 $checked { 'ENABLE_CLAMAV' }{ 'on' } = '' ;
934 $checked { 'ENABLE_CLAMAV' }{ $proxysettings { 'ENABLE_CLAMAV' }} = "checked='checked'" ;
936 & Header
:: openpage
( $Lang :: tr
{ 'advproxy advanced web proxy configuration' }, 1 , '' );
938 & Header
:: openbigbox
( '100%' , 'left' , '' , $errormessage );
941 & Header
:: openbox
( '100%' , 'left' , $Lang :: tr
{ 'error messages' });
942 print "<font class='base'> $errormessage </font> \n " ;
946 if ( $squidversion [ 0 ] =~ /^Squid\sCache:\sVersion\s/i )
948 $squidversion [ 0 ] =~ s/^Squid\sCache:\sVersion//i ;
949 $squidversion [ 0 ] =~ s/^\s+//g ;
950 $squidversion [ 0 ] =~ s/\s+$//g ;
952 $squidversion [ 0 ] = $Lang :: tr
{ 'advproxy unknown' };
955 # ===================================================================
957 # ===================================================================
959 unless ( $proxysettings { 'NCSA_EDIT_MODE' } eq 'yes' ) {
961 print "<form method='post' action=' $ENV {'SCRIPT_NAME'}'> \n " ;
963 & Header
:: openbox
( '100%' , 'left' , " $Lang ::tr{'advproxy advanced web proxy'}" );
968 <td colspan='4' class='base'><b> $Lang ::tr{'advproxy common settings'}</b></td>
971 <td width='25%' class='base'> $Lang ::tr{'advproxy enabled on'} <font color=" $Header ::colourgreen">Green</font>:</td>
972 <td width='20%'><input type='checkbox' name='ENABLE' $checked {'ENABLE'}{'on'} /></td>
973 <td width='25%' class='base'> $Lang ::tr{'advproxy proxy port'}: <img src='/blob.gif' alt='*' /></td>
974 <td width='30%'><input type='text' name='PROXY_PORT' value=' $proxysettings {'PROXY_PORT'}' size='5' /></td>
977 <td class='base'> $Lang ::tr{'advproxy transparent on'} <font color=" $Header ::colourgreen">Green</font>:</td>
978 <td><input type='checkbox' name='TRANSPARENT' $checked {'TRANSPARENT'}{'on'} /></td>
979 <td width='25%' class='base'> $Lang ::tr{'advproxy proxy port transparent'}: <img src='/blob.gif' alt='*' /></td>
980 <td width='30%'><input type='text' name='TRANSPARENT_PORT' value=' $proxysettings {'TRANSPARENT_PORT'}' size='5' /></td>
985 if ( $netsettings { 'BLUE_DEV' }) {
986 print "<td class='base'> $Lang ::tr{'advproxy enabled on'} <font color=' $Header ::colourblue'>Blue</font>:</td>" ;
987 print "<td><input type='checkbox' name='ENABLE_BLUE' $checked {'ENABLE_BLUE'}{'on'} /></td>" ;
989 print "<td colspan='2'> </td>" ;
992 <td class='base'> $Lang ::tr{'advproxy visible hostname'}:</td>
993 <td><input type='text' name='VISIBLE_HOSTNAME' value=' $proxysettings {'VISIBLE_HOSTNAME'}' /></td>
998 if ( $netsettings { 'BLUE_DEV' }) {
999 print "<td class='base'> $Lang ::tr{'advproxy transparent on'} <font color=' $Header ::colourblue'>Blue</font>:</td>" ;
1000 print "<td><input type='checkbox' name='TRANSPARENT_BLUE' $checked {'TRANSPARENT_BLUE'}{'on'} /></td>" ;
1002 print "<td colspan='2'> </td>" ;
1005 <td class='base'> $Lang ::tr{'advproxy error language'}:</td>
1007 <select name='ERR_LANGUAGE'>
1010 foreach (< $errordir /*>) {
1012 $language = substr ( $_ , rindex ( $_ , "/" )+ 1 );
1013 print "<option value=' $language ' $selected {'ERR_LANGUAGE'}{ $language }> $language </option> \n " ;
1021 <td class='base'> $Lang ::tr{'advproxy suppress version'}:</td>
1022 <td><input type='checkbox' name='SUPPRESS_VERSION' $checked {'SUPPRESS_VERSION'}{'on'} /></td>
1023 <td class='base'> $Lang ::tr{'advproxy error design'}:</td>
1024 <td class='base'><select name='ERR_DESIGN'>
1025 <option value='ipfire' $selected {'ERR_DESIGN'}{'ipfire'}>IPFire</option>
1026 <option value='squid' $selected {'ERR_DESIGN'}{'squid'}> $Lang ::tr{'advproxy standard'}</option>
1030 <td class='base'> $Lang ::tr{'advproxy squid version'}:</td>
1031 <td class='base'> [<font color=' $Header ::colourred'> $squidversion [0] </font>]</td>
1037 <table width='100%'>
1038 <tr><td class='base' colspan='4'><b> $Lang ::tr{'advproxy redirector children'}</b></td></tr>
1039 <tr><td class='base' > $Lang ::tr{'processes'}: <img src='/blob.gif' alt='*' /><input type='text' name='CHILDREN' value=' $proxysettings {'CHILDREN'}' size='5' /></td>
1042 my $count = `ip n| wc -l` ;
1043 if ( $count < 1 ){ $count = 1 ;}
1044 if ( - e
"/usr/bin/squidclamav" ) {
1045 print "<td class='base'><b>" . $Lang :: tr
{ 'advproxy squidclamav' }. "</b><br />" ;
1046 if ( ! - e
"/var/run/clamav/clamd.pid" ){
1047 print "<font color='red'>clamav not running</font><br /><br />" ;
1048 $proxysettings { 'ENABLE_CLAMAV' } = 'off' ;
1051 print $Lang :: tr{'advproxy enabled'}."<input type='checkbox' name='ENABLE_CLAMAV' ".$checked{'ENABLE_CLAMAV'}{'on'} . " /><br />" ;
1052 print "+ " . int (( $count **( 1 / 3 )) * 8 );}
1057 print "<td class='base'><a href='/cgi-bin/urlfilter.cgi'><b>" . $Lang :: tr
{ 'advproxy url filter' }. "</a></b><br />" ;
1058 print $Lang :: tr{'advproxy enabled'}."<input type='checkbox' name='ENABLE_FILTER' ".$checked{'ENABLE_FILTER'}{'on'} . " /><br />" ;
1059 print "+ " . int (( $count **( 1 / 3 )) * 6 );
1061 print "<td class='base'><a href='/cgi-bin/updatexlrator.cgi'><b>" . $Lang :: tr
{ 'advproxy update accelerator' }. "</a></b><br />" ;
1062 print $Lang :: tr{'advproxy enabled'}."<input type='checkbox' name='ENABLE_UPDXLRATOR' ".$checked{'ENABLE_UPDXLRATOR'}{'on'} . " /><br />" ;
1063 print "+ " . int (( $count **( 1 / 3 )) * 5 );
1068 <table width='100%'>
1070 <td colspan='4' class='base'><b> $Lang ::tr{'advproxy upstream proxy'}</b></td>
1073 <td width='25%' class='base'> $Lang ::tr{'advproxy via forwarding'}:</td>
1074 <td width='20%'><input type='checkbox' name='FORWARD_VIA' $checked {'FORWARD_VIA'}{'on'} /></td>
1075 <td width='25%' class='base'> $Lang ::tr{'advproxy upstream proxy host:port'}:</td>
1076 <td width='30%'><input type='text' name='UPSTREAM_PROXY' value=' $proxysettings {'UPSTREAM_PROXY'}' /></td>
1079 <td class='base'> $Lang ::tr{'advproxy client IP forwarding'}:</td>
1080 <td><input type='checkbox' name='FORWARD_IPADDRESS' $checked {'FORWARD_IPADDRESS'}{'on'} /></td>
1081 <td class='base'> $Lang ::tr{'advproxy upstream username'}:</td>
1082 <td><input type='text' name='UPSTREAM_USER' value=' $proxysettings {'UPSTREAM_USER'}' /></td>
1085 <td class='base'> $Lang ::tr{'advproxy username forwarding'}:</td>
1086 <td><input type='checkbox' name='FORWARD_USERNAME' $checked {'FORWARD_USERNAME'}{'on'} /></td>
1087 <td class='base'> $Lang ::tr{'advproxy upstream password'}:</td>
1088 <td><input type='password' name='UPSTREAM_PASSWORD' value=' $proxysettings {'UPSTREAM_PASSWORD'}' /></td>
1091 <td class='base'> $Lang ::tr{'advproxy no connection auth'}:</td>
1092 <td><input type='checkbox' name='NO_CONNECTION_AUTH' $checked {'NO_CONNECTION_AUTH'}{'on'} /></td>
1098 <table width='100%'>
1100 <td colspan='4' class='base'><b> $Lang ::tr{'advproxy log settings'}</b></td>
1103 <td width='25%' class='base'> $Lang ::tr{'advproxy log enabled'}:</td>
1104 <td width='20%'><input type='checkbox' name='LOGGING' $checked {'LOGGING'}{'on'} /></td>
1105 <td width='25%'class='base'> $Lang ::tr{'advproxy log query'}:</td>
1106 <td width='30%'><input type='checkbox' name='LOGQUERY' $checked {'LOGQUERY'}{'on'} /></td>
1111 <td class='base'> $Lang ::tr{'advproxy log useragent'}:</td>
1112 <td><input type='checkbox' name='LOGUSERAGENT' $checked {'LOGUSERAGENT'}{'on'} /></td>
1116 <table width='100%'>
1118 <td colspan='4'><b> $Lang ::tr{'advproxy cache management'}</b></td>
1121 <td class='base'><a href='/cgi-bin/cachemgr.cgi' target='_blank'> $Lang ::tr{'proxy cachemgr'}:</td>
1122 <td><input type='checkbox' name='CACHEMGR' $checked {'CACHEMGR'}{'on'} /></td>
1123 <td class='base'> $Lang ::tr{'advproxy admin mail'}:</td>
1124 <td><input type='text' name='ADMIN_MAIL_ADDRESS' value=' $proxysettings {'ADMIN_MAIL_ADDRESS'}' /></td>
1127 <td class='base'> $Lang ::tr{'proxy filedescriptors'}: <img src='/blob.gif' alt='*' /></td>
1128 <td><input type='text' name='FILEDESCRIPTORS' value=' $proxysettings {'FILEDESCRIPTORS'}' size='5' /></td>
1129 <td class='base'> $Lang ::tr{'proxy admin password'}:</td>
1130 <td><input type='text' name='ADMIN_PASSWORD' value=' $proxysettings {'ADMIN_PASSWORD'}' /></td>
1133 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1136 <td class='base'> $Lang ::tr{'advproxy ram cache size'}: <img src='/blob.gif' alt='*' /></td>
1137 <td><input type='text' name='CACHE_MEM' value=' $proxysettings {'CACHE_MEM'}' size='5' /></td>
1138 <td class='base'> $Lang ::tr{'advproxy hdd cache size'}: <img src='/blob.gif' alt='*' /></td>
1139 <td><input type='text' name='CACHE_SIZE' value=' $proxysettings {'CACHE_SIZE'}' size='5' /></td>
1142 <td class='base'> $Lang ::tr{'advproxy min size'}: <img src='/blob.gif' alt='*' /></td>
1143 <td><input type='text' name='MIN_SIZE' value=' $proxysettings {'MIN_SIZE'}' size='5' /></td>
1144 <td class='base'> $Lang ::tr{'advproxy max size'}: <img src='/blob.gif' alt='*' /></td>
1145 <td><input type='text' name='MAX_SIZE' value=' $proxysettings {'MAX_SIZE'}' size='5' /></td>
1148 <td class='base'> $Lang ::tr{'advproxy number of L1 dirs'}:</td>
1149 <td class='base'><select name='L1_DIRS'>
1150 <option value='16' $selected {'L1_DIRS'}{'16'}>16</option>
1151 <option value='32' $selected {'L1_DIRS'}{'32'}>32</option>
1152 <option value='64' $selected {'L1_DIRS'}{'64'}>64</option>
1153 <option value='128' $selected {'L1_DIRS'}{'128'}>128</option>
1154 <option value='256' $selected {'L1_DIRS'}{'256'}>256</option>
1156 <td colspan='2' rowspan= '5' valign='top' class='base'>
1157 <table cellspacing='0' cellpadding='0'>
1159 <!-- intentionally left empty -->
1162 <td> $Lang ::tr{'advproxy no cache sites'}:</td>
1165 <!-- intentionally left empty -->
1168 <!-- intentionally left empty -->
1171 <td><textarea name='DST_NOCACHE' cols='32' rows='6' wrap='off'>
1175 print $proxysettings { 'DST_NOCACHE' };
1184 <td class='base'> $Lang ::tr{'advproxy memory replacement policy'}:</td>
1185 <td class='base'><select name='MEM_POLICY'>
1186 <option value='LRU' $selected {'MEM_POLICY'}{'LRU'}>LRU</option>
1187 <option value='heap LFUDA' $selected {'MEM_POLICY'}{'heap LFUDA'}>heap LFUDA</option>
1188 <option value='heap GDSF' $selected {'MEM_POLICY'}{'heap GDSF'}>heap GDSF</option>
1189 <option value='heap LRU' $selected {'MEM_POLICY'}{'heap LRU'}>heap LRU</option>
1193 <td class='base'> $Lang ::tr{'advproxy cache replacement policy'}:</td>
1194 <td class='base'><select name='CACHE_POLICY'>
1195 <option value='LRU' $selected {'CACHE_POLICY'}{'LRU'}>LRU</option>
1196 <option value='heap LFUDA' $selected {'CACHE_POLICY'}{'heap LFUDA'}>heap LFUDA</option>
1197 <option value='heap GDSF' $selected {'CACHE_POLICY'}{'heap GDSF'}>heap GDSF</option>
1198 <option value='heap LRU' $selected {'CACHE_POLICY'}{'heap LRU'}>heap LRU</option>
1202 <td colspan='2'> </td>
1205 <td class='base'> $Lang ::tr{'advproxy offline mode'}:</td>
1206 <td><input type='checkbox' name='OFFLINE_MODE' $checked {'OFFLINE_MODE'}{'on'} /></td>
1209 <td class='base'> $Lang ::tr{'advproxy cache-digest'}:</td>
1210 <td><input type='checkbox' name='CACHE_DIGESTS' $checked {'CACHE_DIGESTS'}{'on'} /></td>
1214 <table width='100%'>
1216 <td colspan='4'><b> $Lang ::tr{'advproxy destination ports'}</b></td>
1219 <td width='25%' align='center'></td> <td width='20%' align='center'></td><td width='25%' align='center'></td><td width='30%' align='center'></td>
1222 <td colspan='2' class='base'> $Lang ::tr{'advproxy standard ports'}: <img src='/blob.gif' alt='*' /></td>
1223 <td colspan='2' class='base'> $Lang ::tr{'advproxy ssl ports'}: <img src='/blob.gif' alt='*' /></td>
1226 <td colspan='2'><textarea name='PORTS_SAFE' cols='32' rows='6' wrap='off'>
1229 if (! $proxysettings { 'PORTS_SAFE' }) { print $def_ports_safe ; } else { print $proxysettings { 'PORTS_SAFE' }; }
1233 <td colspan='2'><textarea name='PORTS_SSL' cols='32' rows='6' wrap='off'>
1236 if (! $proxysettings { 'PORTS_SSL' }) { print $def_ports_ssl ; } else { print $proxysettings { 'PORTS_SSL' }; }
1243 <table width='100%'>
1245 <td colspan='4'><b> $Lang ::tr{'advproxy network based access'}</b></td>
1248 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1251 <td colspan='4' class='base'> $Lang ::tr{'advproxy allowed subnets'}: <img src='/blob.gif' alt='*' /></td>
1254 <td colspan='2' rowspan='4'><textarea name='SRC_SUBNETS' cols='32' rows='3' wrap='off'>
1258 if (! $proxysettings { 'SRC_SUBNETS' })
1260 print " $green_cidr \n " ;
1261 if ( $netsettings { 'BLUE_DEV' })
1263 print " $blue_cidr \n " ;
1265 } else { print $proxysettings { 'SRC_SUBNETS' }; }
1272 $line = $Lang :: tr
{ 'advproxy no internal proxy on green' };
1273 $line =~ s/Green/<font color="$Header::colourgreen">Green<\/ font
>/ i
;
1274 print "<td class='base'> $line :</td> \n " ;
1276 <td><input type='checkbox' name='NO_PROXY_LOCAL' $checked {'NO_PROXY_LOCAL'}{'on'} /></td>
1280 if ( $netsettings { 'BLUE_DEV' }) {
1281 $line = $Lang :: tr
{ 'advproxy no internal proxy on blue' };
1282 $line =~ s/Blue/<font color="$Header::colourblue">Blue<\/ font
>/ i
;
1284 print "<td class='base'> $line :</td> \n " ;
1286 <td><input type='checkbox' name='NO_PROXY_LOCAL_BLUE' $checked {'NO_PROXY_LOCAL_BLUE'}{'on'} /></td>
1293 <td colspan='2'> </td>
1296 <td colspan='2'> </td>
1299 <table width='100%'>
1301 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1304 <td colspan='2' class='base'> $Lang ::tr{'advproxy unrestricted ip clients'}:</td>
1305 <td colspan='2' class='base'> $Lang ::tr{'advproxy unrestricted mac clients'}:</td>
1308 <td colspan='2'><textarea name='SRC_UNRESTRICTED_IP' cols='32' rows='3' wrap='off'>
1312 print $proxysettings { 'SRC_UNRESTRICTED_IP' };
1316 <td colspan='2'><textarea name='SRC_UNRESTRICTED_MAC' cols='32' rows='3' wrap='off'>
1320 print $proxysettings { 'SRC_UNRESTRICTED_MAC' };
1326 <table width='100%'>
1328 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1331 <td colspan='2' class='base'> $Lang ::tr{'advproxy banned ip clients'}:</td>
1332 <td colspan='2' class='base'> $Lang ::tr{'advproxy banned mac clients'}:</td>
1335 <td colspan='2'><textarea name='SRC_BANNED_IP' cols='32' rows='3' wrap='off'>
1339 print $proxysettings { 'SRC_BANNED_IP' };
1343 <td colspan='2'><textarea name='SRC_BANNED_MAC' cols='32' rows='3' wrap='off'>
1347 print $proxysettings { 'SRC_BANNED_MAC' };
1358 # -------------------------------------------------------------------
1359 # CRE GUI - optional
1360 # -------------------------------------------------------------------
1362 if (- e
$cre_enabled ) { print <<END
1363 <table width='100%'>
1366 <td colspan='4'><b> $Lang ::tr{'advproxy classroom extensions'}</b> $Lang::tr{'advproxy enabled'}:<input type='checkbox' name='CLASSROOM_EXT' $checked{'CLASSROOM_EXT'}{'on'} /></td>
1369 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1375 if ( $proxysettings { 'CLASSROOM_EXT' } eq 'on' ){
1377 <td class='base'> $Lang ::tr{'advproxy supervisor password'}:</td>
1378 <td><input type='password' name='SUPERVISOR_PASSWORD' value=' $proxysettings {'SUPERVISOR_PASSWORD'}' size='12' /></td>
1381 <td colspan='2' class='base'> $Lang ::tr{'advproxy cre group definitions'}:</td>
1382 <td colspan='2' class='base'> $Lang ::tr{'advproxy cre supervisors'}:</td>
1387 if ( $proxysettings { 'CLASSROOM_EXT' } eq 'on' ){
1390 <td colspan='2'><textarea name='CRE_GROUPS' cols='32' rows='6' wrap='off'>
1394 print $proxysettings { 'CRE_GROUPS' };
1398 <td colspan='2'><textarea name='CRE_SVHOSTS' cols='32' rows='6' wrap='off'>
1401 print $proxysettings { 'CRE_SVHOSTS' };
1409 print "</table><hr size='1'>" ;
1413 <input type='hidden' name='SUPERVISOR_PASSWORD' value=' $proxysettings {'SUPERVISOR_PASSWORD'}' />
1414 <input type='hidden' name='CRE_GROUPS' value=' $proxysettings {'CRE_GROUPS'}' />
1415 <input type='hidden' name='CRE_SVHOSTS' value=' $proxysettings {'CRE_SVHOSTS'}' />
1420 # -------------------------------------------------------------------
1424 <table width='100%'>
1426 <td colspan='4'><b> $Lang ::tr{'advproxy time restrictions'}</b></td>
1428 <table width='100%'>
1430 <td width='2%'> $Lang ::tr{'advproxy access'}</td>
1431 <td width='1%'> </td>
1432 <td width='2%' align='center'> $Lang ::tr{'advproxy monday'}</td>
1433 <td width='2%' align='center'> $Lang ::tr{'advproxy tuesday'}</td>
1434 <td width='2%' align='center'> $Lang ::tr{'advproxy wednesday'}</td>
1435 <td width='2%' align='center'> $Lang ::tr{'advproxy thursday'}</td>
1436 <td width='2%' align='center'> $Lang ::tr{'advproxy friday'}</td>
1437 <td width='2%' align='center'> $Lang ::tr{'advproxy saturday'}</td>
1438 <td width='2%' align='center'> $Lang ::tr{'advproxy sunday'}</td>
1439 <td width='1%'> </td>
1440 <td width='7%' colspan=3> $Lang ::tr{'advproxy from'}</td>
1441 <td width='1%'> </td>
1442 <td width='7%' colspan=3> $Lang ::tr{'advproxy to'}</td>
1447 <select name='TIME_ACCESS_MODE'>
1448 <option value='allow' $selected {'TIME_ACCESS_MODE'}{'allow'}> $Lang ::tr{'advproxy mode allow'}</option>
1449 <option value='deny' $selected {'TIME_ACCESS_MODE'}{'deny'}> $Lang ::tr{'advproxy mode deny'}</option>
1453 <td class='base'><input type='checkbox' name='TIME_MON' $checked {'TIME_MON'}{'on'} /></td>
1454 <td class='base'><input type='checkbox' name='TIME_TUE' $checked {'TIME_TUE'}{'on'} /></td>
1455 <td class='base'><input type='checkbox' name='TIME_WED' $checked {'TIME_WED'}{'on'} /></td>
1456 <td class='base'><input type='checkbox' name='TIME_THU' $checked {'TIME_THU'}{'on'} /></td>
1457 <td class='base'><input type='checkbox' name='TIME_FRI' $checked {'TIME_FRI'}{'on'} /></td>
1458 <td class='base'><input type='checkbox' name='TIME_SAT' $checked {'TIME_SAT'}{'on'} /></td>
1459 <td class='base'><input type='checkbox' name='TIME_SUN' $checked {'TIME_SUN'}{'on'} /></td>
1462 <select name='TIME_FROM_HOUR'>
1465 for ( $i = 0 ; $i <= 24 ; $i ++) {
1466 $_ = sprintf ( " %02s " , $i );
1467 print "<option $selected {'TIME_FROM_HOUR'}{ $_ }> $_ </option> \n " ;
1474 <select name='TIME_FROM_MINUTE'>
1477 for ( $i = 0 ; $i <= 45 ; $i += 15 ) {
1478 $_ = sprintf ( " %02s " , $i );
1479 print "<option $selected {'TIME_FROM_MINUTE'}{ $_ }> $_ </option> \n " ;
1486 <select name='TIME_TO_HOUR'>
1489 for ( $i = 0 ; $i <= 24 ; $i ++) {
1490 $_ = sprintf ( " %02s " , $i );
1491 print "<option $selected {'TIME_TO_HOUR'}{ $_ }> $_ </option> \n " ;
1498 <select name='TIME_TO_MINUTE'>
1501 for ( $i = 0 ; $i <= 45 ; $i += 15 ) {
1502 $_ = sprintf ( " %02s " , $i );
1503 print "<option $selected {'TIME_TO_MINUTE'}{ $_ }> $_ </option> \n " ;
1511 <table width='100%'>
1513 <td colspan='4'><b> $Lang ::tr{'advproxy transfer limits'}</b></td>
1516 <td width='25%' class='base'> $Lang ::tr{'advproxy max download size'}: <img src='/blob.gif' alt='*' /></td>
1517 <td width='20%'><input type='text' name='MAX_INCOMING_SIZE' value=' $proxysettings {'MAX_INCOMING_SIZE'}' size='5' /></td>
1518 <td width='25%' class='base'> $Lang ::tr{'advproxy max upload size'}: <img src='/blob.gif' alt='*' /></td>
1519 <td width='30%'><input type='text' name='MAX_OUTGOING_SIZE' value=' $proxysettings {'MAX_OUTGOING_SIZE'}' size='5' /></td>
1523 <table width='100%'>
1525 <td colspan='4'><b> $Lang ::tr{'advproxy download throttling'}</b></td>
1528 <td width='25%' class='base'> $Lang ::tr{'advproxy throttling total on'} <font color=" $Header ::colourgreen">Green</font>:</td>
1529 <td width='20%' class='base'>
1530 <select name='THROTTLING_GREEN_TOTAL'>
1534 foreach ( @throttle_limits ) {
1535 print " \t <option value=' $_ ' $selected {'THROTTLING_GREEN_TOTAL'}{ $_ }> $_ kbit/s</option> \n " ;
1539 <option value='0' $selected {'THROTTLING_GREEN_TOTAL'}{'unlimited'}> $Lang ::tr{'advproxy throttling unlimited'}</option> \n ";
1542 <td width='25%' class='base'> $Lang ::tr{'advproxy throttling per host on'} <font color=" $Header ::colourgreen">Green</font>:</td>
1543 <td width='30%' class='base'>
1544 <select name='THROTTLING_GREEN_HOST'>
1548 foreach ( @throttle_limits ) {
1549 print " \t <option value=' $_ ' $selected {'THROTTLING_GREEN_HOST'}{ $_ }> $_ kbit/s</option> \n " ;
1553 <option value='0' $selected {'THROTTLING_GREEN_HOST'}{'unlimited'}> $Lang ::tr{'advproxy throttling unlimited'}</option> \n ";
1560 if ( $netsettings { 'BLUE_DEV' }) {
1563 <td class='base'> $Lang ::tr{'advproxy throttling total on'} <font color=" $Header ::colourblue">Blue</font>:</td>
1565 <select name='THROTTLING_BLUE_TOTAL'>
1569 foreach ( @throttle_limits ) {
1570 print " \t <option value=' $_ ' $selected {'THROTTLING_BLUE_TOTAL'}{ $_ }> $_ kbit/s</option> \n " ;
1574 <option value='0' $selected {'THROTTLING_BLUE_TOTAL'}{'unlimited'}> $Lang ::tr{'advproxy throttling unlimited'}</option> \n ";
1577 <td class='base'> $Lang ::tr{'advproxy throttling per host on'} <font color=" $Header ::colourblue">Blue</font>:</td>
1579 <select name='THROTTLING_BLUE_HOST'>
1583 foreach ( @throttle_limits ) {
1584 print " \t <option value=' $_ ' $selected {'THROTTLING_BLUE_HOST'}{ $_ }> $_ kbit/s</option> \n " ;
1588 <option value='0' $selected {'THROTTLING_BLUE_HOST'}{'unlimited'}> $Lang ::tr{'advproxy throttling unlimited'}</option> \n ";
1598 <table width='100%'>
1600 <td colspan='4'><i> $Lang ::tr{'advproxy content based throttling'}:</i></td>
1603 <td width='15%' class='base'> $Lang ::tr{'advproxy throttle binary'}:</td>
1604 <td width='10%'><input type='checkbox' name='THROTTLE_BINARY' $checked {'THROTTLE_BINARY'}{'on'} /></td>
1605 <td width='15%' class='base'> $Lang ::tr{'advproxy throttle dskimg'}:</td>
1606 <td width='10%'><input type='checkbox' name='THROTTLE_DSKIMG' $checked {'THROTTLE_DSKIMG'}{'on'} /></td>
1607 <td width='15%' class='base'> $Lang ::tr{'advproxy throttle mmedia'}:</td>
1608 <td width='10%'><input type='checkbox' name='THROTTLE_MMEDIA' $checked {'THROTTLE_MMEDIA'}{'on'} /></td>
1609 <td width='15%'> </td>
1610 <td width='10%'> </td>
1614 <table width='100%'>
1616 <td colspan='4'><b> $Lang ::tr{'advproxy MIME filter'}</b> $Lang::tr{'advproxy enabled'}:<input type='checkbox' name='ENABLE_MIME_FILTER' $checked{'ENABLE_MIME_FILTER'}{'on'} /></td>
1620 if ( $proxysettings { 'ENABLE_MIME_FILTER' } eq 'on' ){
1623 <td colspan='2' class='base'> $Lang ::tr{'advproxy MIME block types'}:</td>
1628 <td colspan='2'><textarea name='MIME_TYPES' cols='32' rows='6' wrap='off'>
1632 print $proxysettings { 'MIME_TYPES' };
1646 <table width='100%'>
1648 <td colspan='4'><b> $Lang ::tr{'advproxy web browser'}</b> $Lang::tr{'advproxy UA enable filter'}:<input type='checkbox' name='ENABLE_BROWSER_CHECK' $checked{'ENABLE_BROWSER_CHECK'}{'on'} /></td>
1652 if ( $proxysettings { 'ENABLE_BROWSER_CHECK' } eq 'on' ){
1658 if ( @useragentlist ) { print " $Lang ::tr{'advproxy allowed web browsers'}:" ; } else { print " $Lang ::tr{'advproxy no clients defined'}" ; }
1663 <table width='100%'>
1667 for ( $n = 0 ; $n <= @useragentlist ; $n = $n + $i ) {
1668 for ( $i = 0 ; $i <= 3 ; $i ++) {
1669 if ( $i eq 0 ) { print "<tr> \n " ; }
1670 if (( $n + $i ) < @useragentlist ) {
1671 @useragent = split ( /,/ , @useragentlist [ $n + $i ]);
1672 print "<td width='15%'> $useragent [1]:<\/td> \n " ;
1673 print "<td width='10%'><input type='checkbox' name='UA_ $useragent [0]' $checked {'UA_'. $useragent [0]}{'on'} /></td> \n " ;
1675 if ( $i eq 3 ) { print "<\/tr> \n " ; }
1682 <table width='100%'>
1684 <td><b> $Lang ::tr{'advproxy privacy'}</b></td>
1687 <td class='base'> $Lang ::tr{'advproxy fake useragent'}:</td>
1688 <td class='base'> $Lang ::tr{'advproxy fake referer'}:</td>
1691 <td><input type='text' name='FAKE_USERAGENT' value=' $proxysettings {'FAKE_USERAGENT'}' size='40%' /></td>
1692 <td><input type='text' name='FAKE_REFERER' value=' $proxysettings {'FAKE_REFERER'}' size='40%' /></td>
1699 my $auth_columns = 5 ;
1700 if ( $HAVE_NTLM_AUTH ) {
1703 my $auth_column_width = 100 / $auth_columns ;
1706 <table width='100%'>
1708 <td colspan=' $auth_columns '><b> $Lang ::tr{'advproxy AUTH method'}</b></td>
1711 <td width=' $auth_column_width %' class='base'><input type='radio' name='AUTH_METHOD' value='none' $checked {'AUTH_METHOD'}{'none'} /> $Lang ::tr{'advproxy AUTH method none'}</td>
1712 <td width=' $auth_column_width %' class='base'><input type='radio' name='AUTH_METHOD' value='ncsa' $checked {'AUTH_METHOD'}{'ncsa'} /> $Lang ::tr{'advproxy AUTH method ncsa'}</td>
1713 <td width=' $auth_column_width %' class='base'><input type='radio' name='AUTH_METHOD' value='ident' $checked {'AUTH_METHOD'}{'ident'} /> $Lang ::tr{'advproxy AUTH method ident'}</td>
1714 <td width=' $auth_column_width %' class='base'><input type='radio' name='AUTH_METHOD' value='ldap' $checked {'AUTH_METHOD'}{'ldap'} /> $Lang ::tr{'advproxy AUTH method ldap'}</td>
1715 <td width=' $auth_column_width %' class='base'><input type='radio' name='AUTH_METHOD' value='ntlm' $checked {'AUTH_METHOD'}{'ntlm'} /> $Lang ::tr{'advproxy AUTH method ntlm'}</td>
1718 if ( $HAVE_NTLM_AUTH ) {
1720 <td width=' $auth_column_width %' class='base'><input type='radio' name='AUTH_METHOD' value='ntlm-auth' $checked {'AUTH_METHOD'}{'ntlm-auth'} /> $Lang ::tr{'advproxy AUTH method ntlm auth'}</td>
1725 <td width=' $auth_column_width %' class='base'><input type='radio' name='AUTH_METHOD' value='radius' $checked {'AUTH_METHOD'}{'radius'} /> $Lang ::tr{'advproxy AUTH method radius'}</td>
1731 if (!( $proxysettings { 'AUTH_METHOD' } eq 'none' )) { if (!( $proxysettings { 'AUTH_METHOD' } eq 'ident' )) { print <<END
1733 <table width='100%'>
1735 <td colspan='4'><b> $Lang ::tr{'advproxy AUTH global settings'}</b></td>
1738 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1741 <td class='base'> $Lang ::tr{'advproxy AUTH number of auth processes'}:</td>
1742 <td><input type='text' name='AUTH_CHILDREN' value=' $proxysettings {'AUTH_CHILDREN'}' size='5' /></td>
1743 <td colspan='2' rowspan= '6' valign='top' class='base'>
1744 <table cellpadding='0' cellspacing='0'>
1746 <td class='base'> $Lang ::tr{'advproxy AUTH realm'}:</td>
1749 <!-- intentionally left empty -->
1752 <!-- intentionally left empty -->
1755 <td><input type='text' name='AUTH_REALM' value=' $proxysettings {'AUTH_REALM'}' size='40' /></td>
1758 <!-- intentionally left empty -->
1761 <!-- intentionally left empty -->
1764 <td> $Lang ::tr{'advproxy AUTH no auth'}:</td>
1767 <!-- intentionally left empty -->
1770 <!-- intentionally left empty -->
1773 <td><textarea name='DST_NOAUTH' cols='32' rows='6' wrap='off'>
1777 print $proxysettings { 'DST_NOAUTH' };
1786 <td class='base'> $Lang ::tr{'advproxy AUTH auth cache TTL'}:</td>
1787 <td><input type='text' name='AUTH_CACHE_TTL' value=' $proxysettings {'AUTH_CACHE_TTL'}' size='5' /></td>
1790 <td class='base'> $Lang ::tr{'advproxy AUTH limit of IP addresses'}:</td>
1791 <td><input type='text' name='AUTH_MAX_USERIP' value=' $proxysettings {'AUTH_MAX_USERIP'}' size='5' /></td>
1794 <td class='base'> $Lang ::tr{'advproxy AUTH user IP cache TTL'}:</td>
1795 <td><input type='text' name='AUTH_IPCACHE_TTL' value=' $proxysettings {'AUTH_IPCACHE_TTL'}' size='5' /></td>
1798 <td class='base'> $Lang ::tr{'advproxy AUTH always required'}:</td>
1799 <td><input type='checkbox' name='AUTH_ALWAYS_REQUIRED' $checked {'AUTH_ALWAYS_REQUIRED'}{'on'} /></td>
1802 <td colspan='2'> </td>
1809 # ===================================================================
1810 # NCSA auth settings
1811 # ===================================================================
1813 if ( $proxysettings { 'AUTH_METHOD' } eq 'ncsa' ) {
1816 <table width='100%'>
1818 <td colspan='4'><b> $Lang ::tr{'advproxy NCSA auth'}</b></td>
1821 <td width='25%' class='base'> $Lang ::tr{'advproxy NCSA min password length'}:</td>
1822 <td width='20%'><input type='text' name='NCSA_MIN_PASS_LEN' value=' $proxysettings {'NCSA_MIN_PASS_LEN'}' size='5' /></td>
1823 <td width='25%' class='base'> $Lang ::tr{'advproxy NCSA redirector bypass'} \' $Lang ::tr{'advproxy NCSA grp extended'} \' :</td>
1824 <td width='20%'><input type='checkbox' name='NCSA_BYPASS_REDIR' $checked {'NCSA_BYPASS_REDIR'}{'on'} /></td>
1827 <td colspan='2'><br> <input type='submit' name='ACTION' value=' $Lang ::tr{'advproxy NCSA user management'}'></td>
1835 # ===================================================================
1836 # IDENTD auth settings
1837 # ===================================================================
1839 if ( $proxysettings { 'AUTH_METHOD' } eq 'ident' ) {
1842 <table width='100%'>
1844 <td colspan='4'><b> $Lang ::tr{'advproxy IDENT identd settings'}</b></td>
1847 <td width='25%' class='base'> $Lang ::tr{'advproxy IDENT required'}:</td>
1848 <td width='20%'><input type='checkbox' name='IDENT_REQUIRED' $checked {'IDENT_REQUIRED'}{'on'} /></td>
1849 <td width='25%' class='base'> $Lang ::tr{'advproxy AUTH always required'}:</td>
1850 <td width='30%'><input type='checkbox' name='AUTH_ALWAYS_REQUIRED' $checked {'AUTH_ALWAYS_REQUIRED'}{'on'} /></td>
1853 <td class='base'> $Lang ::tr{'advproxy IDENT timeout'}:</td>
1854 <td><input type='text' name='IDENT_TIMEOUT' value=' $proxysettings {'IDENT_TIMEOUT'}' size='5' /></td>
1859 <td colspan='2' class='base'> $Lang ::tr{'advproxy IDENT aware hosts'}:</td>
1860 <td colspan='2' class='base'> $Lang ::tr{'advproxy AUTH no auth'}:</td>
1863 <td colspan='2'><textarea name='IDENT_HOSTS' cols='32' rows='6' wrap='off'>
1866 if (! $proxysettings { 'IDENT_HOSTS' }) {
1867 print " $green_cidr \n " ;
1868 if ( $netsettings { 'BLUE_DEV' }) {
1869 print " $blue_cidr \n " ;
1872 print $proxysettings { 'IDENT_HOSTS' };
1877 <td colspan='2'><textarea name='DST_NOAUTH' cols='32' rows='6' wrap='off'>
1881 print $proxysettings { 'DST_NOAUTH' };
1888 <table width='100%'>
1890 <td colspan='4'><b> $Lang ::tr{'advproxy IDENT user based access restrictions'}</b></td>
1893 <td width='25%' class='base'> $Lang ::tr{'advproxy enabled'}:</td>
1894 <td width='20%'><input type='checkbox' name='IDENT_ENABLE_ACL' $checked {'IDENT_ENABLE_ACL'}{'on'} /></td>
1895 <td width='25%'> </td>
1896 <td width='30%'> </td>
1899 <td colspan='2'><input type='radio' name='IDENT_USER_ACL' value='positive' $checked {'IDENT_USER_ACL'}{'positive'} />
1900 $Lang ::tr{'advproxy IDENT use positive access list'}:</td>
1901 <td colspan='2'><input type='radio' name='IDENT_USER_ACL' value='negative' $checked {'IDENT_USER_ACL'}{'negative'} />
1902 $Lang ::tr{'advproxy IDENT use negative access list'}:</td>
1905 <td colspan='2'> $Lang ::tr{'advproxy IDENT authorized users'}</td>
1906 <td colspan='2'> $Lang ::tr{'advproxy IDENT unauthorized users'}</td>
1909 <td colspan='2'><textarea name='IDENT_ALLOW_USERS' cols='32' rows='6' wrap='off'>
1913 if ( $proxysettings { 'AUTH_METHOD' } eq 'ident' ) { print $proxysettings { 'IDENT_ALLOW_USERS' }; }
1915 if ( $proxysettings { 'AUTH_METHOD' } eq 'ident' ) { print <<END
1917 <td colspan='2'><textarea name='IDENT_DENY_USERS' cols='32' rows='6' wrap='off'>
1921 if ( $proxysettings { 'AUTH_METHOD' } eq 'ident' ) { print $proxysettings { 'IDENT_DENY_USERS' }; }
1923 if ( $proxysettings { 'AUTH_METHOD' } eq 'ident' ) { print <<END
1930 # ===================================================================
1931 # NTLM auth settings
1932 # ===================================================================
1934 if ( $proxysettings { 'AUTH_METHOD' } eq 'ntlm' ) {
1937 <table width='100%'>
1939 <td colspan='6'><b> $Lang ::tr{'advproxy NTLM domain settings'}</b></td>
1942 <td class='base'> $Lang ::tr{'advproxy NTLM domain'}:</td>
1943 <td><input type='text' name='NTLM_DOMAIN' value=' $proxysettings {'NTLM_DOMAIN'}' size='15' /></td>
1944 <td class='base'> $Lang ::tr{'advproxy NTLM PDC hostname'}:</td>
1945 <td><input type='text' name='NTLM_PDC' value=' $proxysettings {'NTLM_PDC'}' size='14' /></td>
1946 <td class='base'> $Lang ::tr{'advproxy NTLM BDC hostname'}:</td>
1947 <td><input type='text' name='NTLM_BDC' value=' $proxysettings {'NTLM_BDC'}' size='14' /></td>
1951 <table width='100%'>
1953 <td colspan='3'><b> $Lang ::tr{'advproxy NTLM auth mode'}</b></td>
1956 <td width='25%' class='base' width='25%'> $Lang ::tr{'advproxy NTLM use integrated auth'}:</td>
1957 <td width='20%'><input type='checkbox' name='NTLM_ENABLE_INT_AUTH' $checked {'NTLM_ENABLE_INT_AUTH'}{'on'} /></td>
1962 <table width='100%'>
1964 <td colspan='4'><b> $Lang ::tr{'advproxy NTLM user based access restrictions'}</b></td>
1967 <td width='25%' class='base'> $Lang ::tr{'advproxy enabled'}:</td>
1968 <td width='20%'><input type='checkbox' name='NTLM_ENABLE_ACL' $checked {'NTLM_ENABLE_ACL'}{'on'} /></td>
1969 <td width='25%'> </td>
1970 <td width='30%'> </td>
1973 <td colspan='2'><input type='radio' name='NTLM_USER_ACL' value='positive' $checked {'NTLM_USER_ACL'}{'positive'} />
1974 $Lang ::tr{'advproxy NTLM use positive access list'}:</td>
1975 <td colspan='2'><input type='radio' name='NTLM_USER_ACL' value='negative' $checked {'NTLM_USER_ACL'}{'negative'} />
1976 $Lang ::tr{'advproxy NTLM use negative access list'}:</td>
1979 <td colspan='2'> $Lang ::tr{'advproxy NTLM authorized users'}</td>
1980 <td colspan='2'> $Lang ::tr{'advproxy NTLM unauthorized users'}</td>
1983 <td colspan='2'><textarea name='NTLM_ALLOW_USERS' cols='32' rows='6' wrap='off'>
1987 if ( $proxysettings { 'AUTH_METHOD' } eq 'ntlm' ) { print $proxysettings { 'NTLM_ALLOW_USERS' }; }
1989 if ( $proxysettings { 'AUTH_METHOD' } eq 'ntlm' ) { print <<END
1991 <td colspan='2'><textarea name='NTLM_DENY_USERS' cols='32' rows='6' wrap='off'>
1995 if ( $proxysettings { 'AUTH_METHOD' } eq 'ntlm' ) { print $proxysettings { 'NTLM_DENY_USERS' }; }
1997 if ( $proxysettings { 'AUTH_METHOD' } eq 'ntlm' ) { print <<END
2004 # ===================================================================
2005 # NTLM-AUTH settings
2006 # ===================================================================
2008 if ( $proxysettings { 'AUTH_METHOD' } eq 'ntlm-auth' ) {
2011 <table width='100%'>
2012 <td width='20%' class='base'> $Lang ::tr{'advproxy basic authentication'}:</td>
2013 <td width='40%'><input type='checkbox' name='NTLM_AUTH_BASIC' $checked {'NTLM_AUTH_BASIC'}{'on'} /></td>
2014 <td colspan='2'> </td>
2019 <table width='100%'>
2021 <td colspan='4'><b> $Lang ::tr{'advproxy group access control'}</b></td>
2024 <td width='20%' class='base'> $Lang ::tr{'advproxy group required'}:</td>
2025 <td width='40%'><input type='text' name='NTLM_AUTH_GROUP' value=' $proxysettings {'NTLM_AUTH_GROUP'}' size='37' /></td>
2033 # ===================================================================
2034 # LDAP auth settings
2035 # ===================================================================
2037 if ( $proxysettings { 'AUTH_METHOD' } eq 'ldap' ) {
2040 <table width='100%'>
2042 <td colspan='4'><b> $Lang ::tr{'advproxy LDAP common settings'}</b></td>
2045 <td class='base'> $Lang ::tr{'advproxy LDAP basedn'}:</td>
2046 <td><input type='text' name='LDAP_BASEDN' value=' $proxysettings {'LDAP_BASEDN'}' size='37' /></td>
2047 <td class='base'> $Lang ::tr{'advproxy LDAP type'}:</td>
2048 <td class='base'><select name='LDAP_TYPE'>
2049 <option value='ADS' $selected {'LDAP_TYPE'}{'ADS'}> $Lang ::tr{'advproxy LDAP ADS'}</option>
2050 <option value='NDS' $selected {'LDAP_TYPE'}{'NDS'}> $Lang ::tr{'advproxy LDAP NDS'}</option>
2051 <option value='V2' $selected {'LDAP_TYPE'}{'V2'}> $Lang ::tr{'advproxy LDAP V2'}</option>
2052 <option value='V3' $selected {'LDAP_TYPE'}{'V3'}> $Lang ::tr{'advproxy LDAP V3'}</option>
2056 <td width='20%' class='base'> $Lang ::tr{'advproxy LDAP server'}:</td>
2057 <td width='40%'><input type='text' name='LDAP_SERVER' value=' $proxysettings {'LDAP_SERVER'}' size='14' /></td>
2058 <td width='20%' class='base'> $Lang ::tr{'advproxy LDAP port'}:</td>
2059 <td><input type='text' name='LDAP_PORT' value=' $proxysettings {'LDAP_PORT'}' size='3' /></td>
2063 <table width='100%'>
2065 <td colspan='4'><b> $Lang ::tr{'advproxy LDAP binddn settings'}</b></td>
2068 <td width='20%' class='base'> $Lang ::tr{'advproxy LDAP binddn username'}:</td>
2069 <td width='40%'><input type='text' name='LDAP_BINDDN_USER' value=' $proxysettings {'LDAP_BINDDN_USER'}' size='37' /></td>
2070 <td width='20%' class='base'> $Lang ::tr{'advproxy LDAP binddn password'}:</td>
2071 <td><input type='password' name='LDAP_BINDDN_PASS' value=' $proxysettings {'LDAP_BINDDN_PASS'}' size='14' /></td>
2075 <table width='100%'>
2077 <td colspan='4'><b> $Lang ::tr{'advproxy LDAP group access control'}</b></td>
2080 <td width='20%' class='base'> $Lang ::tr{'advproxy LDAP group required'}:</td>
2081 <td width='40%'><input type='text' name='LDAP_GROUP' value=' $proxysettings {'LDAP_GROUP'}' size='37' /></td>
2089 # ===================================================================
2090 # RADIUS auth settings
2091 # ===================================================================
2093 if ( $proxysettings { 'AUTH_METHOD' } eq 'radius' ) {
2096 <table width='100%'>
2098 <td colspan='4'><b> $Lang ::tr{'advproxy RADIUS radius settings'}</b></td>
2101 <td width='25%' class='base'> $Lang ::tr{'advproxy RADIUS server'}:</td>
2102 <td width='20%'><input type='text' name='RADIUS_SERVER' value=' $proxysettings {'RADIUS_SERVER'}' size='14' /></td>
2103 <td width='25%' class='base'> $Lang ::tr{'advproxy RADIUS port'}:</td>
2104 <td width='30%'><input type='text' name='RADIUS_PORT' value=' $proxysettings {'RADIUS_PORT'}' size='3' /></td>
2107 <td class='base'> $Lang ::tr{'advproxy RADIUS identifier'}:</td>
2108 <td><input type='text' name='RADIUS_IDENTIFIER' value=' $proxysettings {'RADIUS_IDENTIFIER'}' size='14' /></td>
2109 <td class='base'> $Lang ::tr{'advproxy RADIUS secret'}:</td>
2110 <td><input type='password' name='RADIUS_SECRET' value=' $proxysettings {'RADIUS_SECRET'}' size='14' /></td>
2114 <table width='100%'>
2116 <td colspan='4'><b> $Lang ::tr{'advproxy RADIUS user based access restrictions'}</b></td>
2119 <td width='25%' class='base'> $Lang ::tr{'advproxy enabled'}:</td>
2120 <td width='20%'><input type='checkbox' name='RADIUS_ENABLE_ACL' $checked {'RADIUS_ENABLE_ACL'}{'on'} /></td>
2121 <td width='25%'> </td>
2122 <td width='30%'> </td>
2125 <td colspan='2'><input type='radio' name='RADIUS_USER_ACL' value='positive' $checked {'RADIUS_USER_ACL'}{'positive'} />
2126 $Lang ::tr{'advproxy RADIUS use positive access list'}:</td>
2127 <td colspan='2'><input type='radio' name='RADIUS_USER_ACL' value='negative' $checked {'RADIUS_USER_ACL'}{'negative'} />
2128 $Lang ::tr{'advproxy RADIUS use negative access list'}:</td>
2131 <td colspan='2'> $Lang ::tr{'advproxy RADIUS authorized users'}</td>
2132 <td colspan='2'> $Lang ::tr{'advproxy RADIUS unauthorized users'}</td>
2135 <td colspan='2'><textarea name='RADIUS_ALLOW_USERS' cols='32' rows='6' wrap='off'>
2139 if ( $proxysettings { 'AUTH_METHOD' } eq 'radius' ) { print $proxysettings { 'RADIUS_ALLOW_USERS' }; }
2141 if ( $proxysettings { 'AUTH_METHOD' } eq 'radius' ) { print <<END
2143 <td colspan='2'><textarea name='RADIUS_DENY_USERS' cols='32' rows='6' wrap='off'>
2147 if ( $proxysettings { 'AUTH_METHOD' } eq 'radius' ) { print $proxysettings { 'RADIUS_DENY_USERS' }; }
2149 if ( $proxysettings { 'AUTH_METHOD' } eq 'radius' ) { print <<END
2156 # ===================================================================
2162 if ( $proxysettings { 'AUTH_METHOD' } eq 'none' ) {
2164 <td><input type='hidden' name='AUTH_CHILDREN' value=' $proxysettings {'AUTH_CHILDREN'}'></td>
2165 <td><input type='hidden' name='AUTH_CACHE_TTL' value=' $proxysettings {'AUTH_CACHE_TTL'}' size='5' /></td>
2166 <td><input type='hidden' name='AUTH_MAX_USERIP' value=' $proxysettings {'AUTH_MAX_USERIP'}' size='5' /></td>
2167 <td><input type='hidden' name='AUTH_IPCACHE_TTL' value=' $proxysettings {'AUTH_IPCACHE_TTL'}' size='5' /></td>
2168 <td><input type='hidden' name='AUTH_ALWAYS_REQUIRED' value=' $proxysettings {'AUTH_ALWAYS_REQUIRED'}'></td>
2169 <td><input type='hidden' name='AUTH_REALM' value=' $proxysettings {'AUTH_REALM'}'></td>
2170 <td><input type='hidden' name='DST_NOAUTH' value=' $proxysettings {'DST_NOAUTH'}'></td>
2174 if ( $proxysettings { 'AUTH_METHOD' } eq 'ident' ) {
2176 <td><input type='hidden' name='AUTH_CHILDREN' value=' $proxysettings {'AUTH_CHILDREN'}'></td>
2177 <td><input type='hidden' name='AUTH_CACHE_TTL' value=' $proxysettings {'AUTH_CACHE_TTL'}' size='5' /></td>
2178 <td><input type='hidden' name='AUTH_MAX_USERIP' value=' $proxysettings {'AUTH_MAX_USERIP'}' size='5' /></td>
2179 <td><input type='hidden' name='AUTH_IPCACHE_TTL' value=' $proxysettings {'AUTH_IPCACHE_TTL'}' size='5' /></td>
2180 <td><input type='hidden' name='AUTH_REALM' value=' $proxysettings {'AUTH_REALM'}'></td>
2184 if (!( $proxysettings { 'AUTH_METHOD' } eq 'ncsa' )) {
2186 <td><input type='hidden' name='NCSA_MIN_PASS_LEN' value=' $proxysettings {'NCSA_MIN_PASS_LEN'}'></td>
2187 <td><input type='hidden' name='NCSA_BYPASS_REDIR' value=' $proxysettings {'NCSA_BYPASS_REDIR'}'></td>
2191 if (!( $proxysettings { 'AUTH_METHOD' } eq 'ident' )) {
2193 <td><input type='hidden' name='IDENT_REQUIRED' value=' $proxysettings {'IDENT_REQUIRED'}'></td>
2194 <td><input type='hidden' name='IDENT_TIMEOUT' value=' $proxysettings {'IDENT_TIMEOUT'}'></td>
2195 <td><input type='hidden' name='IDENT_HOSTS' value=' $proxysettings {'IDENT_HOSTS'}'></td>
2196 <td><input type='hidden' name='IDENT_ENABLE_ACL' value=' $proxysettings {'IDENT_ENABLE_ACL'}'></td>
2197 <td><input type='hidden' name='IDENT_USER_ACL' value=' $proxysettings {'IDENT_USER_ACL'}'></td>
2198 <td><input type='hidden' name='IDENT_ALLOW_USERS' value=' $proxysettings {'IDENT_ALLOW_USERS'}'></td>
2199 <td><input type='hidden' name='IDENT_DENY_USERS' value=' $proxysettings {'IDENT_DENY_USERS'}'></td>
2203 if (!( $proxysettings { 'AUTH_METHOD' } eq 'ldap' )) {
2205 <td><input type='hidden' name='LDAP_BASEDN' value=' $proxysettings {'LDAP_BASEDN'}'></td>
2206 <td><input type='hidden' name='LDAP_TYPE' value=' $proxysettings {'LDAP_TYPE'}'></td>
2207 <td><input type='hidden' name='LDAP_SERVER' value=' $proxysettings {'LDAP_SERVER'}'></td>
2208 <td><input type='hidden' name='LDAP_PORT' value=' $proxysettings {'LDAP_PORT'}'></td>
2209 <td><input type='hidden' name='LDAP_BINDDN_USER' value=' $proxysettings {'LDAP_BINDDN_USER'}'></td>
2210 <td><input type='hidden' name='LDAP_BINDDN_PASS' value=' $proxysettings {'LDAP_BINDDN_PASS'}'></td>
2211 <td><input type='hidden' name='LDAP_GROUP' value=' $proxysettings {'LDAP_GROUP'}'></td>
2215 if (!( $proxysettings { 'AUTH_METHOD' } eq 'ntlm' )) {
2217 <td><input type='hidden' name='NTLM_DOMAIN' value=' $proxysettings {'NTLM_DOMAIN'}'></td>
2218 <td><input type='hidden' name='NTLM_PDC' value=' $proxysettings {'NTLM_PDC'}'></td>
2219 <td><input type='hidden' name='NTLM_BDC' value=' $proxysettings {'NTLM_BDC'}'></td>
2220 <td><input type='hidden' name='NTLM_ENABLE_INT_AUTH' value=' $proxysettings {'NTLM_ENABLE_INT_AUTH'}'></td>
2221 <td><input type='hidden' name='NTLM_ENABLE_ACL' value=' $proxysettings {'NTLM_ENABLE_ACL'}'></td>
2222 <td><input type='hidden' name='NTLM_USER_ACL' value=' $proxysettings {'NTLM_USER_ACL'}'></td>
2223 <td><input type='hidden' name='NTLM_ALLOW_USERS' value=' $proxysettings {'NTLM_ALLOW_USERS'}'></td>
2224 <td><input type='hidden' name='NTLM_DENY_USERS' value=' $proxysettings {'NTLM_DENY_USERS'}'></td>
2228 if (!( $proxysettings { 'AUTH_METHOD' } eq 'radius' )) {
2230 <td><input type='hidden' name='RADIUS_SERVER' value=' $proxysettings {'RADIUS_SERVER'}'></td>
2231 <td><input type='hidden' name='RADIUS_PORT' value=' $proxysettings {'RADIUS_PORT'}'></td>
2232 <td><input type='hidden' name='RADIUS_IDENTIFIER' value=' $proxysettings {'RADIUS_IDENTIFIER'}'></td>
2233 <td><input type='hidden' name='RADIUS_SECRET' value=' $proxysettings {'RADIUS_SECRET'}'></td>
2234 <td><input type='hidden' name='RADIUS_ENABLE_ACL' value=' $proxysettings {'RADIUS_ENABLE_ACL'}'></td>
2235 <td><input type='hidden' name='RADIUS_USER_ACL' value=' $proxysettings {'RADIUS_USER_ACL'}'></td>
2236 <td><input type='hidden' name='RADIUS_ALLOW_USERS' value=' $proxysettings {'RADIUS_ALLOW_USERS'}'></td>
2237 <td><input type='hidden' name='RADIUS_DENY_USERS' value=' $proxysettings {'RADIUS_DENY_USERS'}'></td>
2249 <table width='100%'>
2252 <td align='center'><input type='submit' name='ACTION' value=' $Lang ::tr{'save'}' /></td>
2253 <td align='center'><input type='submit' name='ACTION' value=' $Lang ::tr{'proxy reconfigure'}' /></td>
2254 <td align='center'><input type='submit' name='ACTION' value=' $Lang ::tr{'advproxy save and restart'}' /></td>
2255 <td align='center'><input type='submit' name='ACTION' value=' $Lang ::tr{'advproxy clear cache'}' /></td>
2261 <table width='100%'>
2263 <td><img src='/blob.gif' align='top' alt='*' /> <font class='base'> $Lang ::tr{'required field'}</font></td>
2264 <td align='right'> </td>
2271 & Header
:: closebox
();
2275 # ===================================================================
2276 # NCSA user management
2277 # ===================================================================
2279 & Header
:: openbox
( '100%' , 'left' , " $Lang ::tr{'advproxy NCSA auth'}" );
2281 <form method='post' action=' $ENV {'SCRIPT_NAME'}'>
2282 <table width='100%'>
2284 <td colspan='4'><b> $Lang ::tr{'advproxy NCSA user management'}</b></td>
2287 <td width='25%' class='base'> $Lang ::tr{'advproxy NCSA username'}:</td>
2288 <td width='25%'><input type='text' name='NCSA_USERNAME' value=' $proxysettings {'NCSA_USERNAME'}' size='12'
2291 if ( $proxysettings { 'ACTION' } eq $Lang :: tr
{ 'edit' }) { print " readonly='readonly' " ; }
2294 <td width='25%' class='base'> $Lang ::tr{'advproxy NCSA group'}:</td>
2296 <select name='NCSA_GROUP'>
2297 <option value='standard' $selected {'NCSA_GROUP'}{'standard'}> $Lang ::tr{'advproxy NCSA grp standard'}</option>
2298 <option value='extended' $selected {'NCSA_GROUP'}{'extended'}> $Lang ::tr{'advproxy NCSA grp extended'}</option>
2299 <option value='disabled' $selected {'NCSA_GROUP'}{'disabled'}> $Lang ::tr{'advproxy NCSA grp disabled'}</option>
2305 <td class='base'> $Lang ::tr{'advproxy NCSA password'}:</td>
2306 <td><input type='password' name='NCSA_PASS' value=' $proxysettings {'NCSA_PASS'}' size='14' /></td>
2307 <td class='base'> $Lang ::tr{'advproxy NCSA password confirm'}:</td>
2308 <td><input type='password' name='NCSA_PASS_CONFIRM' value=' $proxysettings {'NCSA_PASS_CONFIRM'}' size='14' /></td>
2315 <td><input type='submit' name='SUBMIT' value=' $ncsa_buttontext ' /></td>
2316 <td><input type='hidden' name='ACTION' value=' $Lang ::tr{'add'}' /></td>
2317 <td><input type='hidden' name='NCSA_MIN_PASS_LEN' value=' $proxysettings {'NCSA_MIN_PASS_LEN'}'></td>
2320 if ( $proxysettings { 'ACTION' } eq $Lang :: tr
{ 'edit' }) {
2321 print "<td><input type='reset' name='ACTION' value=' $Lang ::tr{'advproxy reset'}' /></td> \n " ;
2327 <td><input type='button' name='return2main' value=' $Lang ::tr{'advproxy back to main page'}' onClick='self.location.href=" $ENV {'SCRIPT_NAME'}"'></td>
2332 <table width='100%'>
2334 <td><b> $Lang ::tr{'advproxy NCSA user accounts'}:</b></td>
2337 <table width='100%' align='center'>
2343 open ( FILE
, $extgrp ); @grouplist = < FILE
>; close ( FILE
);
2344 foreach $user ( @grouplist ) { chomp ( $user ); push ( @userlist , $user . ":extended" ); }
2348 open ( FILE
, $stdgrp ); @grouplist = < FILE
>; close ( FILE
);
2349 foreach $user ( @grouplist ) { chomp ( $user ); push ( @userlist , $user . ":standard" ); }
2353 open ( FILE
, $disgrp ); @grouplist = < FILE
>; close ( FILE
);
2354 foreach $user ( @grouplist ) { chomp ( $user ); push ( @userlist , $user . ":disabled" ); }
2357 @userlist = sort ( @userlist );
2359 # If the password file contains entries, print entries and action icons
2361 if ( ! - z
" $userdb " ) {
2364 <td width='30%' class='boldbase' align='center'><b><i> $Lang ::tr{'advproxy NCSA username'}</i></b></td>
2365 <td width='30%' class='boldbase' align='center'><b><i> $Lang ::tr{'advproxy NCSA group membership'}</i></b></td>
2366 <td class='boldbase' colspan='2' align='center'> </td>
2371 foreach $line ( @userlist )
2375 @temp = split ( /:/ , $line );
2376 if ( $proxysettings { 'ACTION' } eq $Lang :: tr
{ 'edit' } && $proxysettings { 'ID' } eq $line ) {
2377 print "<tr bgcolor=' $Header ::colouryellow'> \n " ; }
2379 print "<tr bgcolor=' $color {'color20'}'> \n " ; }
2381 print "<tr bgcolor=' $color {'color22'}'> \n " ; }
2384 <td align='center'> $temp [0]</td>
2388 if ( $temp [ 1 ] eq 'standard' ) {
2389 print $Lang :: tr
{ 'advproxy NCSA grp standard' };
2390 } elsif ( $temp [ 1 ] eq 'extended' ) {
2391 print $Lang :: tr
{ 'advproxy NCSA grp extended' };
2392 } elsif ( $temp [ 1 ] eq 'disabled' ) {
2393 print $Lang :: tr
{ 'advproxy NCSA grp disabled' }; }
2396 <td width='8%' align='center'>
2397 <form method='post' name='frma $id ' action=' $ENV {'SCRIPT_NAME'}'>
2398 <input type='image' name=' $Lang ::tr{'edit'}' src='/images/edit.gif' title=' $Lang ::tr{'edit'}' alt=' $Lang ::tr{'edit'}' />
2399 <input type='hidden' name='ID' value=' $line ' />
2400 <input type='hidden' name='ACTION' value=' $Lang ::tr{'edit'}' />
2404 <td width='8%' align='center'>
2405 <form method='post' name='frmb $id ' action=' $ENV {'SCRIPT_NAME'}'>
2406 <input type='image' name=' $Lang ::tr{'remove'}' src='/images/delete.gif' title=' $Lang ::tr{'remove'}' alt=' $Lang ::tr{'remove'}' />
2407 <input type='hidden' name='ID' value=' $temp [0]' />
2408 <input type='hidden' name='ACTION' value=' $Lang ::tr{'remove'}' />
2421 <td class='boldbase'> <b> $Lang ::tr{'legend'}:</b></td>
2422 <td> <img src='/images/edit.gif' alt=' $Lang ::tr{'edit'}' /></td>
2423 <td class='base'> $Lang ::tr{'edit'}</td>
2424 <td> <img src='/images/delete.gif' alt=' $Lang ::tr{'remove'}' /></td>
2425 <td class='base'> $Lang ::tr{'remove'}</td>
2432 <td><i> $Lang ::tr{'advproxy NCSA no accounts'}</i></td>
2443 & Header
:: closebox
();
2447 # ===================================================================
2449 & Header
:: closebigbox
();
2451 & Header
:: closepage
();
2453 # -------------------------------------------------------------------
2457 if (- e
" $acl_src_subnets " ) {
2458 open ( FILE
, " $acl_src_subnets " );
2459 delete $proxysettings { 'SRC_SUBNETS' };
2460 while (< FILE
>) { $proxysettings { 'SRC_SUBNETS' } .= $_ };
2463 if (- e
" $acl_src_banned_ip " ) {
2464 open ( FILE
, " $acl_src_banned_ip " );
2465 delete $proxysettings { 'SRC_BANNED_IP' };
2466 while (< FILE
>) { $proxysettings { 'SRC_BANNED_IP' } .= $_ };
2469 if (- e
" $acl_src_banned_mac " ) {
2470 open ( FILE
, " $acl_src_banned_mac " );
2471 delete $proxysettings { 'SRC_BANNED_MAC' };
2472 while (< FILE
>) { $proxysettings { 'SRC_BANNED_MAC' } .= $_ };
2475 if (- e
" $acl_src_unrestricted_ip " ) {
2476 open ( FILE
, " $acl_src_unrestricted_ip " );
2477 delete $proxysettings { 'SRC_UNRESTRICTED_IP' };
2478 while (< FILE
>) { $proxysettings { 'SRC_UNRESTRICTED_IP' } .= $_ };
2481 if (- e
" $acl_src_unrestricted_mac " ) {
2482 open ( FILE
, " $acl_src_unrestricted_mac " );
2483 delete $proxysettings { 'SRC_UNRESTRICTED_MAC' };
2484 while (< FILE
>) { $proxysettings { 'SRC_UNRESTRICTED_MAC' } .= $_ };
2487 if (- e
" $acl_dst_nocache " ) {
2488 open ( FILE
, " $acl_dst_nocache " );
2489 delete $proxysettings { 'DST_NOCACHE' };
2490 while (< FILE
>) { $proxysettings { 'DST_NOCACHE' } .= $_ };
2493 if (- e
" $acl_dst_noauth " ) {
2494 open ( FILE
, " $acl_dst_noauth " );
2495 delete $proxysettings { 'DST_NOAUTH' };
2496 while (< FILE
>) { $proxysettings { 'DST_NOAUTH' } .= $_ };
2499 if (- e
" $acl_ports_safe " ) {
2500 open ( FILE
, " $acl_ports_safe " );
2501 delete $proxysettings { 'PORTS_SAFE' };
2502 while (< FILE
>) { $proxysettings { 'PORTS_SAFE' } .= $_ };
2505 if (- e
" $acl_ports_ssl " ) {
2506 open ( FILE
, " $acl_ports_ssl " );
2507 delete $proxysettings { 'PORTS_SSL' };
2508 while (< FILE
>) { $proxysettings { 'PORTS_SSL' } .= $_ };
2511 if (- e
" $mimetypes " ) {
2512 open ( FILE
, " $mimetypes " );
2513 delete $proxysettings { 'MIME_TYPES' };
2514 while (< FILE
>) { $proxysettings { 'MIME_TYPES' } .= $_ };
2517 if (- e
" $ntlmdir /msntauth.allowusers" ) {
2518 open ( FILE
, " $ntlmdir /msntauth.allowusers" );
2519 delete $proxysettings { 'NTLM_ALLOW_USERS' };
2520 while (< FILE
>) { $proxysettings { 'NTLM_ALLOW_USERS' } .= $_ };
2523 if (- e
" $ntlmdir /msntauth.denyusers" ) {
2524 open ( FILE
, " $ntlmdir /msntauth.denyusers" );
2525 delete $proxysettings { 'NTLM_DENY_USERS' };
2526 while (< FILE
>) { $proxysettings { 'NTLM_DENY_USERS' } .= $_ };
2529 if (- e
" $raddir /radauth.allowusers" ) {
2530 open ( FILE
, " $raddir /radauth.allowusers" );
2531 delete $proxysettings { 'RADIUS_ALLOW_USERS' };
2532 while (< FILE
>) { $proxysettings { 'RADIUS_ALLOW_USERS' } .= $_ };
2535 if (- e
" $raddir /radauth.denyusers" ) {
2536 open ( FILE
, " $raddir /radauth.denyusers" );
2537 delete $proxysettings { 'RADIUS_DENY_USERS' };
2538 while (< FILE
>) { $proxysettings { 'RADIUS_DENY_USERS' } .= $_ };
2541 if (- e
" $identdir /identauth.allowusers" ) {
2542 open ( FILE
, " $identdir /identauth.allowusers" );
2543 delete $proxysettings { 'IDENT_ALLOW_USERS' };
2544 while (< FILE
>) { $proxysettings { 'IDENT_ALLOW_USERS' } .= $_ };
2547 if (- e
" $identdir /identauth.denyusers" ) {
2548 open ( FILE
, " $identdir /identauth.denyusers" );
2549 delete $proxysettings { 'IDENT_DENY_USERS' };
2550 while (< FILE
>) { $proxysettings { 'IDENT_DENY_USERS' } .= $_ };
2553 if (- e
" $identhosts " ) {
2554 open ( FILE
, " $identhosts " );
2555 delete $proxysettings { 'IDENT_HOSTS' };
2556 while (< FILE
>) { $proxysettings { 'IDENT_HOSTS' } .= $_ };
2559 if (- e
" $cre_groups " ) {
2560 open ( FILE
, " $cre_groups " );
2561 delete $proxysettings { 'CRE_GROUPS' };
2562 while (< FILE
>) { $proxysettings { 'CRE_GROUPS' } .= $_ };
2565 if (- e
" $cre_svhosts " ) {
2566 open ( FILE
, " $cre_svhosts " );
2567 delete $proxysettings { 'CRE_SVHOSTS' };
2568 while (< FILE
>) { $proxysettings { 'CRE_SVHOSTS' } .= $_ };
2573 # -------------------------------------------------------------------
2577 @temp = split ( /\n/ , $proxysettings { 'PORTS_SAFE' });
2578 undef $proxysettings { 'PORTS_SAFE' };
2581 s/^\s+//g ; s/\s+$//g ;
2585 if ( /^[^#]+\s+#\sSquids\sport/ ) { s/(^[^#]+)(\s+#\sSquids\sport)/$proxysettings{'PROXY_PORT'}\2/ ; $line = $_ ; }
2587 if ( /.*-.*-.*/ ) { $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid destination port' }; }
2588 @templist = split ( /-/ );
2589 foreach ( @templist ) { unless (& General
:: validport
( $_ )) { $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid destination port' }; } }
2590 $proxysettings { 'PORTS_SAFE' } .= $line . " \n " ;
2594 @temp = split ( /\n/ , $proxysettings { 'PORTS_SSL' });
2595 undef $proxysettings { 'PORTS_SSL' };
2598 s/^\s+//g ; s/\s+$//g ;
2603 if ( /.*-.*-.*/ ) { $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid destination port' }; }
2604 @templist = split ( /-/ );
2605 foreach ( @templist ) { unless (& General
:: validport
( $_ )) { $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid destination port' }; } }
2606 $proxysettings { 'PORTS_SSL' } .= $line . " \n " ;
2610 @temp = split ( /\n/ , $proxysettings { 'DST_NOCACHE' });
2611 undef $proxysettings { 'DST_NOCACHE' };
2615 unless ( /^#/ ) { s/\s+//g ; }
2618 if ( /^\./ ) { $_ = '*' . $_ ; }
2619 $proxysettings { 'DST_NOCACHE' } .= $_ . " \n " ;
2623 @temp = split ( /\n/ , $proxysettings { 'SRC_SUBNETS' });
2624 undef $proxysettings { 'SRC_SUBNETS' };
2627 s/^\s+//g ; s/\s+$//g ;
2630 unless (& General
:: validipandmask
( $_ )) { $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid ip or mask' }; }
2631 $proxysettings { 'SRC_SUBNETS' } .= $_ . " \n " ;
2635 @temp = split ( /\n/ , $proxysettings { 'SRC_BANNED_IP' });
2636 undef $proxysettings { 'SRC_BANNED_IP' };
2639 s/^\s+//g ; s/\s+$//g ;
2642 unless (& General
:: validipormask
( $_ )) { $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid ip or mask' }; }
2643 $proxysettings { 'SRC_BANNED_IP' } .= $_ . " \n " ;
2647 @temp = split ( /\n/ , $proxysettings { 'SRC_BANNED_MAC' });
2648 undef $proxysettings { 'SRC_BANNED_MAC' };
2651 s/^\s+//g ; s/\s+$//g ; s/-/:/g ;
2654 unless (& General
:: validmac
( $_ )) { $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid mac' }; }
2655 $proxysettings { 'SRC_BANNED_MAC' } .= $_ . " \n " ;
2659 @temp = split ( /\n/ , $proxysettings { 'SRC_UNRESTRICTED_IP' });
2660 undef $proxysettings { 'SRC_UNRESTRICTED_IP' };
2663 s/^\s+//g ; s/\s+$//g ;
2666 unless (& General
:: validipormask
( $_ )) { $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid ip or mask' }; }
2667 $proxysettings { 'SRC_UNRESTRICTED_IP' } .= $_ . " \n " ;
2671 @temp = split ( /\n/ , $proxysettings { 'SRC_UNRESTRICTED_MAC' });
2672 undef $proxysettings { 'SRC_UNRESTRICTED_MAC' };
2675 s/^\s+//g ; s/\s+$//g ; s/-/:/g ;
2678 unless (& General
:: validmac
( $_ )) { $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid mac' }; }
2679 $proxysettings { 'SRC_UNRESTRICTED_MAC' } .= $_ . " \n " ;
2683 @temp = split ( /\n/ , $proxysettings { 'DST_NOAUTH' });
2684 undef $proxysettings { 'DST_NOAUTH' };
2688 unless ( /^#/ ) { s/\s+//g ; }
2691 if ( /^\./ ) { $_ = '*' . $_ ; }
2692 $proxysettings { 'DST_NOAUTH' } .= $_ . " \n " ;
2696 if (( $proxysettings { 'NTLM_ENABLE_ACL' } eq 'on' ) && ( $proxysettings { 'NTLM_USER_ACL' } eq 'positive' ))
2698 @temp = split ( /\n/ , $proxysettings { 'NTLM_ALLOW_USERS' });
2699 undef $proxysettings { 'NTLM_ALLOW_USERS' };
2702 s/^\s+//g ; s/\s+$//g ;
2703 if ( $_ ) { $proxysettings { 'NTLM_ALLOW_USERS' } .= $_ . " \n " ; }
2705 if ( $proxysettings { 'NTLM_ALLOW_USERS' } eq '' ) { $errormessage = $Lang :: tr
{ 'advproxy errmsg acl cannot be empty' }; }
2708 if (( $proxysettings { 'NTLM_ENABLE_ACL' } eq 'on' ) && ( $proxysettings { 'NTLM_USER_ACL' } eq 'negative' ))
2710 @temp = split ( /\n/ , $proxysettings { 'NTLM_DENY_USERS' });
2711 undef $proxysettings { 'NTLM_DENY_USERS' };
2714 s/^\s+//g ; s/\s+$//g ;
2715 if ( $_ ) { $proxysettings { 'NTLM_DENY_USERS' } .= $_ . " \n " ; }
2717 if ( $proxysettings { 'NTLM_DENY_USERS' } eq '' ) { $errormessage = $Lang :: tr
{ 'advproxy errmsg acl cannot be empty' }; }
2720 if (( $proxysettings { 'IDENT_ENABLE_ACL' } eq 'on' ) && ( $proxysettings { 'IDENT_USER_ACL' } eq 'positive' ))
2722 @temp = split ( /\n/ , $proxysettings { 'IDENT_ALLOW_USERS' });
2723 undef $proxysettings { 'IDENT_ALLOW_USERS' };
2726 s/^\s+//g ; s/\s+$//g ;
2727 if ( $_ ) { $proxysettings { 'IDENT_ALLOW_USERS' } .= $_ . " \n " ; }
2729 if ( $proxysettings { 'IDENT_ALLOW_USERS' } eq '' ) { $errormessage = $Lang :: tr
{ 'advproxy errmsg acl cannot be empty' }; }
2732 if (( $proxysettings { 'IDENT_ENABLE_ACL' } eq 'on' ) && ( $proxysettings { 'IDENT_USER_ACL' } eq 'negative' ))
2734 @temp = split ( /\n/ , $proxysettings { 'IDENT_DENY_USERS' });
2735 undef $proxysettings { 'IDENT_DENY_USERS' };
2738 s/^\s+//g ; s/\s+$//g ;
2739 if ( $_ ) { $proxysettings { 'IDENT_DENY_USERS' } .= $_ . " \n " ; }
2741 if ( $proxysettings { 'IDENT_DENY_USERS' } eq '' ) { $errormessage = $Lang :: tr
{ 'advproxy errmsg acl cannot be empty' }; }
2744 if (( $proxysettings { 'RADIUS_ENABLE_ACL' } eq 'on' ) && ( $proxysettings { 'RADIUS_USER_ACL' } eq 'positive' ))
2746 @temp = split ( /\n/ , $proxysettings { 'RADIUS_ALLOW_USERS' });
2747 undef $proxysettings { 'RADIUS_ALLOW_USERS' };
2750 s/^\s+//g ; s/\s+$//g ;
2751 if ( $_ ) { $proxysettings { 'RADIUS_ALLOW_USERS' } .= $_ . " \n " ; }
2753 if ( $proxysettings { 'RADIUS_ALLOW_USERS' } eq '' ) { $errormessage = $Lang :: tr
{ 'advproxy errmsg acl cannot be empty' }; }
2756 if (( $proxysettings { 'RADIUS_ENABLE_ACL' } eq 'on' ) && ( $proxysettings { 'RADIUS_USER_ACL' } eq 'negative' ))
2758 @temp = split ( /\n/ , $proxysettings { 'RADIUS_DENY_USERS' });
2759 undef $proxysettings { 'RADIUS_DENY_USERS' };
2762 s/^\s+//g ; s/\s+$//g ;
2763 if ( $_ ) { $proxysettings { 'RADIUS_DENY_USERS' } .= $_ . " \n " ; }
2765 if ( $proxysettings { 'RADIUS_DENY_USERS' } eq '' ) { $errormessage = $Lang :: tr
{ 'advproxy errmsg acl cannot be empty' }; }
2768 @temp = split ( /\n/ , $proxysettings { 'IDENT_HOSTS' });
2769 undef $proxysettings { 'IDENT_HOSTS' };
2772 s/^\s+//g ; s/\s+$//g ;
2775 unless (& General
:: validipormask
( $_ )) { $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid ip or mask' }; }
2776 $proxysettings { 'IDENT_HOSTS' } .= $_ . " \n " ;
2780 @temp = split ( /\n/ , $proxysettings { 'CRE_SVHOSTS' });
2781 undef $proxysettings { 'CRE_SVHOSTS' };
2784 s/^\s+//g ; s/\s+$//g ;
2787 unless (& General
:: validipormask
( $_ )) { $errormessage = $Lang :: tr
{ 'advproxy errmsg invalid ip or mask' }; }
2788 $proxysettings { 'CRE_SVHOSTS' } .= $_ . " \n " ;
2793 # -------------------------------------------------------------------
2797 open ( FILE
, "> $acl_src_subnets " );
2799 if (! $proxysettings { 'SRC_SUBNETS' })
2801 print FILE
" $green_cidr \n " ;
2802 if ( $netsettings { 'BLUE_DEV' })
2804 print FILE
" $blue_cidr \n " ;
2806 } else { print FILE
$proxysettings { 'SRC_SUBNETS' }; }
2809 open ( FILE
, "> $acl_src_banned_ip " );
2811 print FILE
$proxysettings { 'SRC_BANNED_IP' };
2814 open ( FILE
, "> $acl_src_banned_mac " );
2816 print FILE
$proxysettings { 'SRC_BANNED_MAC' };
2819 open ( FILE
, "> $acl_src_unrestricted_ip " );
2821 print FILE
$proxysettings { 'SRC_UNRESTRICTED_IP' };
2824 open ( FILE
, "> $acl_src_unrestricted_mac " );
2826 print FILE
$proxysettings { 'SRC_UNRESTRICTED_MAC' };
2829 open ( FILE
, "> $acl_dst_noauth " );
2831 print FILE
$proxysettings { 'DST_NOAUTH' };
2834 open ( FILE
, "> $acl_dst_noauth_net " );
2836 open ( FILE
, "> $acl_dst_noauth_dom " );
2838 open ( FILE
, "> $acl_dst_noauth_url " );
2841 @temp = split ( /\n/ , $proxysettings { 'DST_NOAUTH' });
2849 open ( FILE
, ">> $acl_dst_noauth_dom " );
2854 elsif (& General
:: validipormask
( $_ ))
2856 open ( FILE
, ">> $acl_dst_noauth_net " );
2861 elsif ( /\d\d?\d?\.\d\d?\d?\.\d\d?\d?\.\d\d?\d?-\d\d?\d?\.\d\d?\d?\.\d\d?\d?\.\d\d?\d?/ )
2863 open ( FILE
, ">> $acl_dst_noauth_net " );
2870 open ( FILE
, ">> $acl_dst_noauth_url " );
2872 if ( /^[fh]tt?ps?:\/ \
// ) { print FILE
" $_ \n " ; } else { print FILE
"^[fh]tt?ps?:// $_ \n " ; }
2878 open ( FILE
, "> $acl_dst_nocache " );
2880 print FILE
$proxysettings { 'DST_NOCACHE' };
2883 open ( FILE
, "> $acl_dst_nocache_net " );
2885 open ( FILE
, "> $acl_dst_nocache_dom " );
2887 open ( FILE
, "> $acl_dst_nocache_url " );
2890 @temp = split ( /\n/ , $proxysettings { 'DST_NOCACHE' });
2898 open ( FILE
, ">> $acl_dst_nocache_dom " );
2903 elsif (& General
:: validipormask
( $_ ))
2905 open ( FILE
, ">> $acl_dst_nocache_net " );
2910 elsif ( /\d\d?\d?\.\d\d?\d?\.\d\d?\d?\.\d\d?\d?-\d\d?\d?\.\d\d?\d?\.\d\d?\d?\.\d\d?\d?/ )
2912 open ( FILE
, ">> $acl_dst_nocache_net " );
2919 open ( FILE
, ">> $acl_dst_nocache_url " );
2921 if ( /^[fh]tt?ps?:\/ \
// ) { print FILE
" $_ \n " ; } else { print FILE
"^[fh]tt?ps?:// $_ \n " ; }
2927 open ( FILE
, "> $acl_ports_safe " );
2929 if (! $proxysettings { 'PORTS_SAFE' }) { print FILE
$def_ports_safe ; } else { print FILE
$proxysettings { 'PORTS_SAFE' }; }
2932 open ( FILE
, "> $acl_ports_ssl " );
2934 if (! $proxysettings { 'PORTS_SSL' }) { print FILE
$def_ports_ssl ; } else { print FILE
$proxysettings { 'PORTS_SSL' }; }
2937 open ( FILE
, "> $acl_dst_throttle " );
2939 if ( $proxysettings { 'THROTTLE_BINARY' } eq 'on' )
2941 @temp = split ( /\|/ , $throttle_binary );
2942 foreach ( @temp ) { print FILE
" \\ . $_ \$ \n " ; }
2944 if ( $proxysettings { 'THROTTLE_DSKIMG' } eq 'on' )
2946 @temp = split ( /\|/ , $throttle_dskimg );
2947 foreach ( @temp ) { print FILE
" \\ . $_ \$ \n " ; }
2949 if ( $proxysettings { 'THROTTLE_MMEDIA' } eq 'on' )
2951 @temp = split ( /\|/ , $throttle_mmedia );
2952 foreach ( @temp ) { print FILE
" \\ . $_ \$ \n " ; }
2954 if (- s
$throttled_urls )
2956 open ( URLFILE
, $throttled_urls );
2959 foreach ( @temp ) { print FILE
; }
2963 open ( FILE
, "> $mimetypes " );
2965 print FILE
$proxysettings { 'MIME_TYPES' };
2968 open ( FILE
, "> $ntlmdir /msntauth.allowusers" );
2970 print FILE
$proxysettings { 'NTLM_ALLOW_USERS' };
2973 open ( FILE
, "> $ntlmdir /msntauth.denyusers" );
2975 print FILE
$proxysettings { 'NTLM_DENY_USERS' };
2978 open ( FILE
, "> $raddir /radauth.allowusers" );
2980 print FILE
$proxysettings { 'RADIUS_ALLOW_USERS' };
2983 open ( FILE
, "> $raddir /radauth.denyusers" );
2985 print FILE
$proxysettings { 'RADIUS_DENY_USERS' };
2988 open ( FILE
, "> $identdir /identauth.allowusers" );
2990 print FILE
$proxysettings { 'IDENT_ALLOW_USERS' };
2993 open ( FILE
, "> $identdir /identauth.denyusers" );
2995 print FILE
$proxysettings { 'IDENT_DENY_USERS' };
2998 open ( FILE
, "> $identhosts " );
3000 print FILE
$proxysettings { 'IDENT_HOSTS' };
3003 open ( FILE
, "> $cre_groups " );
3005 print FILE
$proxysettings { 'CRE_GROUPS' };
3008 open ( FILE
, "> $cre_svhosts " );
3010 print FILE
$proxysettings { 'CRE_SVHOSTS' };
3014 # -------------------------------------------------------------------
3018 open ( FILE
, ">/srv/web/ipfire/html/proxy.pac" );
3020 print FILE
"function FindProxyForURL(url, host) \n " ;
3022 if (( $proxysettings { 'ENABLE' } eq 'on' ) || ( $proxysettings { 'ENABLE_BLUE' } eq 'on' ))
3026 (isPlainHostName(host)) ||
3027 (isInNet(host, "127.0.0.1", "255.0.0.0")) ||
3031 if ( $netsettings { 'GREEN_DEV' }) {
3032 print FILE
" (isInNet(host, \" $netsettings {'GREEN_NETADDRESS'} \" , \" $netsettings {'GREEN_NETMASK'} \" )) || \n " ;
3035 if (& Header
:: blue_used
() && $netsettings { 'BLUE_DEV' }) {
3036 print FILE
" (isInNet(host, \" $netsettings {'BLUE_NETADDRESS'} \" , \" $netsettings {'BLUE_NETMASK'} \" )) || \n " ;
3039 if (& Header
:: orange_used
() && $netsettings { 'ORANGE_DEV' }) {
3040 print FILE
" (isInNet(host, \" $netsettings {'ORANGE_NETADDRESS'} \" , \" $netsettings {'ORANGE_NETMASK'} \" )) || \n " ;
3044 (isInNet(host, "169.254.0.0", "255.255.0.0"))
3052 if ( $proxysettings { 'ENABLE' } eq 'on' )
3054 print FILE
"if ( \n " ;
3055 print FILE
" (isInNet(myIpAddress(), \" $netsettings {'GREEN_NETADDRESS'} \" , \" $netsettings {'GREEN_NETMASK'} \" ))" ;
3058 if (- e
" $acl_src_subnets " ) {
3059 open ( SUBNETS
, " $acl_src_subnets " );
3060 @templist = < SUBNETS
>;
3066 @temp = split ( /\/ /);
3068 ( $temp [ 0 ] ne $netsettings { 'GREEN_NETADDRESS' }) && ( $temp [ 1 ] ne $netsettings { 'GREEN_NETMASK' }) &&
3069 ( $temp [ 0 ] ne $netsettings { 'BLUE_NETADDRESS' }) && ( $temp [ 1 ] ne $netsettings { 'BLUE_NETMASK' })
3073 print FILE
" || \n (isInNet(myIpAddress(), \" $temp [0] \" , \" $temp [1] \" ))" ;
3081 return "PROXY $netsettings {'GREEN_ADDRESS'}: $proxysettings {'PROXY_PORT'}";
3085 if (( $proxysettings { 'ENABLE' } eq 'on' ) && ( $proxysettings { 'ENABLE_BLUE' } eq 'on' ) && ( $netsettings { 'BLUE_DEV' }))
3087 print FILE
" \n else \n\n " ;
3089 if (( $netsettings { 'BLUE_DEV' }) && ( $proxysettings { 'ENABLE_BLUE' } eq 'on' ))
3093 (isInNet(myIpAddress(), " $netsettings {'BLUE_NETADDRESS'}", " $netsettings {'BLUE_NETMASK'}"))
3095 return "PROXY $netsettings {'BLUE_ADDRESS'}: $proxysettings {'PROXY_PORT'}";
3104 # -------------------------------------------------------------------
3111 if ( $proxysettings { 'THROTTLING_GREEN_TOTAL' } +
3112 $proxysettings { 'THROTTLING_GREEN_HOST' } +
3113 $proxysettings { 'THROTTLING_BLUE_TOTAL' } +
3114 $proxysettings { 'THROTTLING_BLUE_HOST' } gt 0 )
3116 $delaypools = 1 ; } else { $delaypools = 0 ;
3119 if ( $proxysettings { 'AUTH_REALM' } eq '' )
3121 $authrealm = "IPFire Advanced Proxy Server" ;
3123 $authrealm = $proxysettings { 'AUTH_REALM' };
3126 $_ = $proxysettings { 'UPSTREAM_PROXY' };
3127 my ( $remotehost , $remoteport ) = split ( /:/ , $_ );
3129 if ( $remoteport eq '' ) { $remoteport = 80 ; }
3131 open ( FILE
, ">${General::swroot}/proxy/squid.conf" );
3134 # Do not modify '${General::swroot}/proxy/squid.conf' directly since any changes
3135 # you make will be overwritten whenever you resave proxy settings using the
3138 # Instead, modify the file ' $acl_include ' and
3139 # then restart the proxy service using the web interface. Changes made to the
3140 # 'include.acl' file will propagate to the 'squid.conf' file at that time.
3142 shutdown_lifetime 5 seconds
3148 # Include file with user defined settings.
3149 if (- e
"/etc/squid/squid.conf.pre.local" ) {
3150 print FILE
"include /etc/squid/squid.conf.pre.local \n\n " ;
3153 print FILE
"http_port $netsettings {'GREEN_ADDRESS'}: $proxysettings {'PROXY_PORT'}" ;
3154 if ( $proxysettings { 'NO_CONNECTION_AUTH' } eq 'on' ) { print FILE
" no-connection-auth" }
3157 if ( $proxysettings { 'TRANSPARENT' } eq 'on' ) {
3158 print FILE
"http_port $netsettings {'GREEN_ADDRESS'}: $proxysettings {'TRANSPARENT_PORT'} intercept" ;
3159 if ( $proxysettings { 'NO_CONNECTION_AUTH' } eq 'on' ) { print FILE
" no-connection-auth" }
3163 if ( $netsettings { 'BLUE_DEV' } && $proxysettings { 'ENABLE_BLUE' } eq 'on' ) {
3164 print FILE
"http_port $netsettings {'BLUE_ADDRESS'}: $proxysettings {'PROXY_PORT'}" ;
3165 if ( $proxysettings { 'NO_CONNECTION_AUTH' } eq 'on' ) { print FILE
" no-connection-auth" }
3168 if ( $proxysettings { 'TRANSPARENT_BLUE' } eq 'on' ) {
3169 print FILE
"http_port $netsettings {'BLUE_ADDRESS'}: $proxysettings {'TRANSPARENT_PORT'} intercept" ;
3170 if ( $proxysettings { 'NO_CONNECTION_AUTH' } eq 'on' ) { print FILE
" no-connection-auth" }
3175 if ( $proxysettings { 'CACHE_SIZE' } > 0 )
3179 if (!- z
$acl_dst_nocache_dom ) {
3180 print FILE
"acl no_cache_domains dstdomain \" $acl_dst_nocache_dom \"\n " ;
3181 print FILE
"cache deny no_cache_domains \n " ;
3183 if (!- z
$acl_dst_nocache_net ) {
3184 print FILE
"acl no_cache_ipaddr dst \" $acl_dst_nocache_net \"\n " ;
3185 print FILE
"cache deny no_cache_ipaddr \n " ;
3187 if (!- z
$acl_dst_nocache_url ) {
3188 print FILE
"acl no_cache_hosts url_regex -i \" $acl_dst_nocache_url \"\n " ;
3189 print FILE
"cache deny no_cache_hosts \n " ;
3195 cache_effective_user squid
3198 pid_filename /var/run/squid.pid
3200 cache_mem $proxysettings {'CACHE_MEM'} MB
3203 print FILE
"error_directory $errordir / $proxysettings {'ERR_LANGUAGE'} \n\n " ;
3205 if ( $proxysettings { 'OFFLINE_MODE' } eq 'on' ) { print FILE
"offline_mode on \n\n " ; }
3206 if ( $proxysettings { 'CACHE_DIGESTS' } eq 'on' ) { print FILE
"digest_generation on \n\n " ; } else { print FILE
"digest_generation off \n\n " ; }
3208 if ((!( $proxysettings { 'MEM_POLICY' } eq 'LRU' )) || (!( $proxysettings { 'CACHE_POLICY' } eq 'LRU' )))
3210 if (!( $proxysettings { 'MEM_POLICY' } eq 'LRU' ))
3212 print FILE
"memory_replacement_policy $proxysettings {'MEM_POLICY'} \n " ;
3214 if (!( $proxysettings { 'CACHE_POLICY' } eq 'LRU' ))
3216 print FILE
"cache_replacement_policy $proxysettings {'CACHE_POLICY'} \n " ;
3221 open ( PORTS
, " $acl_ports_ssl " );
3222 my @ssl_ports = < PORTS
>;
3226 foreach ( @ssl_ports ) {
3227 print FILE
"acl SSL_ports port $_ " ;
3231 open ( PORTS
, " $acl_ports_safe " );
3232 my @safe_ports = < PORTS
>;
3236 foreach ( @safe_ports ) {
3237 print FILE
"acl Safe_ports port $_ " ;
3243 acl IPFire_http port $http_port
3244 acl IPFire_https port $https_port
3245 acl IPFire_ips dst $netsettings {'GREEN_ADDRESS'}
3246 acl IPFire_networks src " $acl_src_subnets "
3247 acl IPFire_servers dst " $acl_src_subnets "
3248 acl IPFire_green_network src $green_cidr
3249 acl IPFire_green_servers dst $green_cidr
3252 if ( $netsettings { 'BLUE_DEV' }) { print FILE
"acl IPFire_blue_network src $blue_cidr \n " ; }
3253 if ( $netsettings { 'BLUE_DEV' }) { print FILE
"acl IPFire_blue_servers dst $blue_cidr \n " ; }
3254 if (!- z
$acl_src_banned_ip ) { print FILE
"acl IPFire_banned_ips src \" $acl_src_banned_ip \"\n " ; }
3255 if (!- z
$acl_src_banned_mac ) { print FILE
"acl IPFire_banned_mac arp \" $acl_src_banned_mac \"\n " ; }
3256 if (!- z
$acl_src_unrestricted_ip ) { print FILE
"acl IPFire_unrestricted_ips src \" $acl_src_unrestricted_ip \"\n " ; }
3257 if (!- z
$acl_src_unrestricted_mac ) { print FILE
"acl IPFire_unrestricted_mac arp \" $acl_src_unrestricted_mac \"\n " ; }
3259 acl CONNECT method CONNECT
3263 if ( $proxysettings { 'CACHE_SIZE' } > 0 ) {
3265 maximum_object_size $proxysettings {'MAX_SIZE'} KB
3266 minimum_object_size $proxysettings {'MIN_SIZE'} KB
3268 cache_dir aufs /var/log/cache $proxysettings {'CACHE_SIZE'} $proxysettings {'L1_DIRS'} 256
3272 print FILE
"cache deny all \n\n " ;
3276 request_body_max_size $proxysettings {'MAX_OUTGOING_SIZE'} KB
3280 if ( $proxysettings { 'MAX_INCOMING_SIZE' } > 0 ) {
3281 if (!- z
$acl_src_unrestricted_ip ) { print FILE
"reply_body_max_size none IPFire_unrestricted_ips \n " ; }
3282 if (!- z
$acl_src_unrestricted_mac ) { print FILE
"reply_body_max_size none IPFire_unrestricted_mac \n " ; }
3283 if ( $proxysettings { 'AUTH_METHOD' } eq 'ncsa' )
3285 if (!- z
$extgrp ) { print FILE
"reply_body_max_size none for_extended_users \n " ; }
3289 if ( $proxysettings { 'MAX_INCOMING_SIZE' } != '0' )
3291 print FILE
"reply_body_max_size $proxysettings {'MAX_INCOMING_SIZE'} KB all \n\n " ;
3294 if ( $proxysettings { 'LOGGING' } eq 'on' )
3297 access_log stdio:/var/log/squid/access.log
3298 cache_log /var/log/squid/cache.log
3299 cache_store_log none
3302 if ( $proxysettings { 'LOGUSERAGENT' } eq 'on' ) { print FILE
"access_log stdio:\/var\/log\/squid\/user_agent.log useragent \n " ; }
3303 if ( $proxysettings { 'LOGQUERY' } eq 'on' ) { print FILE
" \n strip_query_terms off \n " ; }
3306 access_log /dev/null
3308 cache_store_log none
3317 if ( $proxysettings { 'FORWARD_IPADDRESS' } eq 'on' )
3319 print FILE
"forwarded_for on \n " ;
3321 print FILE
"forwarded_for off \n " ;
3323 if ( $proxysettings { 'FORWARD_VIA' } eq 'on' )
3325 print FILE
"via on \n " ;
3327 print FILE
"via off \n " ;
3331 if ((!( $proxysettings { 'AUTH_METHOD' } eq 'none' )) && (!( $proxysettings { 'AUTH_METHOD' } eq 'ident' )))
3333 if ( $proxysettings { 'AUTH_METHOD' } eq 'ncsa' )
3335 print FILE
"auth_param basic program $authdir /basic_ncsa_auth $userdb \n " ;
3336 print FILE
"auth_param basic children $proxysettings {'AUTH_CHILDREN'} \n " ;
3337 print FILE
"auth_param basic realm $authrealm \n " ;
3338 print FILE
"auth_param basic credentialsttl $proxysettings {'AUTH_CACHE_TTL'} minutes \n " ;
3339 if (!( $proxysettings { 'AUTH_IPCACHE_TTL' } eq '0' )) { print FILE
" \n authenticate_ip_ttl $proxysettings {'AUTH_IPCACHE_TTL'} minutes \n " ; }
3342 if ( $proxysettings { 'AUTH_METHOD' } eq 'ldap' )
3344 print FILE
"auth_param basic utf8 on \n " ;
3345 print FILE
"auth_param basic program $authdir /basic_ldap_auth -b \" $proxysettings {'LDAP_BASEDN'} \" " ;
3346 if (!( $proxysettings { 'LDAP_BINDDN_USER' } eq '' )) { print FILE
" -D \" $proxysettings {'LDAP_BINDDN_USER'} \" " ; }
3347 if (!( $proxysettings { 'LDAP_BINDDN_PASS' } eq '' )) { print FILE
" -w $proxysettings {'LDAP_BINDDN_PASS'}" ; }
3348 if ( $proxysettings { 'LDAP_TYPE' } eq 'ADS' )
3350 if ( $proxysettings { 'LDAP_GROUP' } eq '' )
3352 print FILE
" -f \" (\&(objectClass=person)(sAMAccountName=\ %s )) \" " ;
3354 print FILE
" -f \" (\&(\&(objectClass=person)(sAMAccountName=\ %s ))(memberOf= $proxysettings {'LDAP_GROUP'})) \" " ;
3356 print FILE
" -u sAMAccountName -P" ;
3358 if ( $proxysettings { 'LDAP_TYPE' } eq 'NDS' )
3360 if ( $proxysettings { 'LDAP_GROUP' } eq '' )
3362 print FILE
" -f \" (\&(objectClass=person)(cn=\ %s )) \" " ;
3364 print FILE
" -f \" (\&(\&(objectClass=person)(cn=\ %s ))(groupMembership= $proxysettings {'LDAP_GROUP'})) \" " ;
3366 print FILE
" -u cn -P" ;
3368 if (( $proxysettings { 'LDAP_TYPE' } eq 'V2' ) || ( $proxysettings { 'LDAP_TYPE' } eq 'V3' ))
3370 if ( $proxysettings { 'LDAP_GROUP' } eq '' )
3372 print FILE
" -f \" (\&(objectClass=person)(uid=\ %s )) \" " ;
3374 print FILE
" -f \" (\&(\&(objectClass=person)(uid=\ %s ))(memberOf= $proxysettings {'LDAP_GROUP'})) \" " ;
3376 if ( $proxysettings { 'LDAP_TYPE' } eq 'V2' ) { print FILE
" -v 2" ; }
3377 if ( $proxysettings { 'LDAP_TYPE' } eq 'V3' ) { print FILE
" -v 3" ; }
3378 print FILE
" -u uid -P" ;
3380 print FILE
" $proxysettings {'LDAP_SERVER'}: $proxysettings {'LDAP_PORT'} \n " ;
3381 print FILE
"auth_param basic children $proxysettings {'AUTH_CHILDREN'} \n " ;
3382 print FILE
"auth_param basic realm $authrealm \n " ;
3383 print FILE
"auth_param basic credentialsttl $proxysettings {'AUTH_CACHE_TTL'} minutes \n " ;
3384 if (!( $proxysettings { 'AUTH_IPCACHE_TTL' } eq '0' )) { print FILE
" \n authenticate_ip_ttl $proxysettings {'AUTH_IPCACHE_TTL'} minutes \n " ; }
3387 if ( $proxysettings { 'AUTH_METHOD' } eq 'ntlm' )
3389 if ( $proxysettings { 'NTLM_ENABLE_INT_AUTH' } eq 'on' )
3391 print FILE
"auth_param ntlm program $authdir /ntlm_smb_lm_auth $proxysettings {'NTLM_DOMAIN'}/ $proxysettings {'NTLM_PDC'}" ;
3392 if ( $proxysettings { 'NTLM_BDC' } eq '' ) { print FILE
" \n " ; } else { print FILE
" $proxysettings {'NTLM_DOMAIN'}/ $proxysettings {'NTLM_BDC'} \n " ; }
3393 print FILE
"auth_param ntlm children $proxysettings {'AUTH_CHILDREN'} \n " ;
3394 if (!( $proxysettings { 'AUTH_IPCACHE_TTL' } eq '0' )) { print FILE
" \n authenticate_ip_ttl $proxysettings {'AUTH_IPCACHE_TTL'} minutes \n " ; }
3396 print FILE
"auth_param basic program $authdir /basic_msnt_auth \n " ;
3397 print FILE
"auth_param basic children $proxysettings {'AUTH_CHILDREN'} \n " ;
3398 print FILE
"auth_param basic realm $authrealm \n " ;
3399 print FILE
"auth_param basic credentialsttl $proxysettings {'AUTH_CACHE_TTL'} minutes \n " ;
3400 if (!( $proxysettings { 'AUTH_IPCACHE_TTL' } eq '0' )) { print FILE
" \n authenticate_ip_ttl $proxysettings {'AUTH_IPCACHE_TTL'} minutes \n " ; }
3402 open ( MSNTCONF
, "> $ntlmdir /msntauth.conf" );
3404 print MSNTCONF
"server $proxysettings {'NTLM_PDC'}" ;
3405 if ( $proxysettings { 'NTLM_BDC' } eq '' ) { print MSNTCONF
" $proxysettings {'NTLM_PDC'}" ; } else { print MSNTCONF
" $proxysettings {'NTLM_BDC'}" ; }
3406 print MSNTCONF
" $proxysettings {'NTLM_DOMAIN'} \n " ;
3407 if ( $proxysettings { 'NTLM_ENABLE_ACL' } eq 'on' )
3409 if ( $proxysettings { 'NTLM_USER_ACL' } eq 'positive' )
3411 print MSNTCONF
"allowusers $ntlmdir /msntauth.allowusers \n " ;
3413 print MSNTCONF
"denyusers $ntlmdir /msntauth.denyusers \n " ;
3420 if ( $proxysettings { 'AUTH_METHOD' } eq 'ntlm-auth' )
3422 print FILE
"auth_param ntlm program /usr/bin/ntlm_auth --helper-protocol=squid-2.5-ntlmssp" ;
3423 if ( $proxysettings { 'NTLM_AUTH_GROUP' }) {
3424 my $ntlm_auth_group = $proxysettings { 'NTLM_AUTH_GROUP' };
3425 $ntlm_auth_group =~ s/\\/\+/ ;
3427 print FILE
" --require-membership-of= \" $ntlm_auth_group \" " ;
3431 print FILE
"auth_param ntlm children $proxysettings {'AUTH_CHILDREN'} \n\n " ;
3433 # BASIC authentication
3434 if ( $proxysettings { 'NTLM_AUTH_BASIC' } eq "on" ) {
3435 print FILE
"auth_param basic program /usr/bin/ntlm_auth --helper-protocol=squid-2.5-basic" ;
3436 if ( $proxysettings { 'NTLM_AUTH_GROUP' }) {
3437 my $ntlm_auth_group = $proxysettings { 'NTLM_AUTH_GROUP' };
3438 $ntlm_auth_group =~ s/\\/\+/ ;
3440 print FILE
" --require-membership-of= \" $ntlm_auth_group \" " ;
3443 print FILE
"auth_param basic children 10 \n " ;
3444 print FILE
"auth_param basic realm IPFire Web Proxy Server \n " ;
3445 print FILE
"auth_param basic credentialsttl 2 hours \n\n " ;
3449 if ( $proxysettings { 'AUTH_METHOD' } eq 'radius' )
3451 print FILE
"auth_param basic program $authdir /basic_radius_auth -h $proxysettings {'RADIUS_SERVER'} -p $proxysettings {'RADIUS_PORT'} " ;
3452 if (!( $proxysettings { 'RADIUS_IDENTIFIER' } eq '' )) { print FILE
"-i $proxysettings {'RADIUS_IDENTIFIER'} " ; }
3453 print FILE
"-w $proxysettings {'RADIUS_SECRET'} \n " ;
3454 print FILE
"auth_param basic children $proxysettings {'AUTH_CHILDREN'} \n " ;
3455 print FILE
"auth_param basic realm $authrealm \n " ;
3456 print FILE
"auth_param basic credentialsttl $proxysettings {'AUTH_CACHE_TTL'} minutes \n " ;
3457 if (!( $proxysettings { 'AUTH_IPCACHE_TTL' } eq '0' )) { print FILE
" \n authenticate_ip_ttl $proxysettings {'AUTH_IPCACHE_TTL'} minutes \n " ; }
3461 print FILE
"acl for_inetusers proxy_auth REQUIRED \n " ;
3462 if (( $proxysettings { 'AUTH_METHOD' } eq 'ntlm' ) && ( $proxysettings { 'NTLM_ENABLE_INT_AUTH' } eq 'on' ) && ( $proxysettings { 'NTLM_ENABLE_ACL' } eq 'on' ))
3464 if ((!- z
" $ntlmdir /msntauth.allowusers" ) && ( $proxysettings { 'NTLM_USER_ACL' } eq 'positive' ))
3466 print FILE
"acl for_acl_users proxy_auth \" $ntlmdir /msntauth.allowusers \"\n " ;
3468 if ((!- z
" $ntlmdir /msntauth.denyusers" ) && ( $proxysettings { 'NTLM_USER_ACL' } eq 'negative' ))
3470 print FILE
"acl for_acl_users proxy_auth \" $ntlmdir /msntauth.denyusers \"\n " ;
3473 if (( $proxysettings { 'AUTH_METHOD' } eq 'radius' ) && ( $proxysettings { 'RADIUS_ENABLE_ACL' } eq 'on' ))
3475 if ((!- z
" $raddir /radauth.allowusers" ) && ( $proxysettings { 'RADIUS_USER_ACL' } eq 'positive' ))
3477 print FILE
"acl for_acl_users proxy_auth \" $raddir /radauth.allowusers \"\n " ;
3479 if ((!- z
" $raddir /radauth.denyusers" ) && ( $proxysettings { 'RADIUS_USER_ACL' } eq 'negative' ))
3481 print FILE
"acl for_acl_users proxy_auth \" $raddir /radauth.denyusers \"\n " ;
3484 if ( $proxysettings { 'AUTH_METHOD' } eq 'ncsa' )
3487 if (!- z
$extgrp ) { print FILE
"acl for_extended_users proxy_auth \" $extgrp \"\n " ; }
3488 if (!- z
$disgrp ) { print FILE
"acl for_disabled_users proxy_auth \" $disgrp \"\n " ; }
3490 if (!( $proxysettings { 'AUTH_MAX_USERIP' } eq '' )) { print FILE
" \n acl concurrent max_user_ip -s $proxysettings {'AUTH_MAX_USERIP'} \n " ; }
3493 if (!- z
$acl_dst_noauth_net ) { print FILE
"acl to_ipaddr_without_auth dst \" $acl_dst_noauth_net \"\n " ; }
3494 if (!- z
$acl_dst_noauth_dom ) { print FILE
"acl to_domains_without_auth dstdomain \" $acl_dst_noauth_dom \"\n " ; }
3495 if (!- z
$acl_dst_noauth_url ) { print FILE
"acl to_hosts_without_auth url_regex -i \" $acl_dst_noauth_url \"\n " ; }
3500 if ( $proxysettings { 'AUTH_METHOD' } eq 'ident' )
3502 if ( $proxysettings { 'IDENT_REQUIRED' } eq 'on' )
3504 print FILE
"acl for_inetusers ident REQUIRED \n " ;
3506 if ( $proxysettings { 'IDENT_ENABLE_ACL' } eq 'on' )
3508 if ((!- z
" $identdir /identauth.allowusers" ) && ( $proxysettings { 'IDENT_USER_ACL' } eq 'positive' ))
3510 print FILE
"acl for_acl_users ident_regex -i \" $identdir /identauth.allowusers \"\n\n " ;
3512 if ((!- z
" $identdir /identauth.denyusers" ) && ( $proxysettings { 'IDENT_USER_ACL' } eq 'negative' ))
3514 print FILE
"acl for_acl_users ident_regex -i \" $identdir /identauth.denyusers \"\n\n " ;
3517 if (!- z
$acl_dst_noauth_net ) { print FILE
"acl to_ipaddr_without_auth dst \" $acl_dst_noauth_net \"\n " ; }
3518 if (!- z
$acl_dst_noauth_dom ) { print FILE
"acl to_domains_without_auth dstdomain \" $acl_dst_noauth_dom \"\n " ; }
3519 if (!- z
$acl_dst_noauth_url ) { print FILE
"acl to_hosts_without_auth url_regex -i \" $acl_dst_noauth_url \"\n " ; }
3523 if (( $delaypools ) && (!- z
$acl_dst_throttle )) { print FILE
"acl for_throttled_urls url_regex -i \" $acl_dst_throttle \"\n\n " ; }
3525 if ( $proxysettings { 'ENABLE_BROWSER_CHECK' } eq 'on' ) { print FILE
"acl with_allowed_useragents browser $browser_regexp \n\n " ; }
3527 print FILE
"acl within_timeframe time " ;
3528 if ( $proxysettings { 'TIME_MON' } eq 'on' ) { print FILE
"M" ; }
3529 if ( $proxysettings { 'TIME_TUE' } eq 'on' ) { print FILE
"T" ; }
3530 if ( $proxysettings { 'TIME_WED' } eq 'on' ) { print FILE
"W" ; }
3531 if ( $proxysettings { 'TIME_THU' } eq 'on' ) { print FILE
"H" ; }
3532 if ( $proxysettings { 'TIME_FRI' } eq 'on' ) { print FILE
"F" ; }
3533 if ( $proxysettings { 'TIME_SAT' } eq 'on' ) { print FILE
"A" ; }
3534 if ( $proxysettings { 'TIME_SUN' } eq 'on' ) { print FILE
"S" ; }
3535 print FILE
" $proxysettings {'TIME_FROM_HOUR'}:" ;
3536 print FILE
" $proxysettings {'TIME_FROM_MINUTE'}-" ;
3537 print FILE
" $proxysettings {'TIME_TO_HOUR'}:" ;
3538 print FILE
" $proxysettings {'TIME_TO_MINUTE'} \n\n " ;
3540 if ((!- z
$mimetypes ) && ( $proxysettings { 'ENABLE_MIME_FILTER' } eq 'on' )) {
3541 print FILE
"acl blocked_mimetypes rep_mime_type \" $mimetypes \"\n\n " ;
3544 if ( $proxysettings { 'CLASSROOM_EXT' } eq 'on' ) {
3547 #Classroom extensions
3548 acl IPFire_no_access_ips src " $acl_src_noaccess_ip "
3549 acl IPFire_no_access_mac arp " $acl_src_noaccess_mac "
3552 print FILE
"deny_info " ;
3553 if (( $proxysettings { 'ERR_DESIGN' } eq 'squid' ) && (- e
" $errordir / $proxysettings {'ERR_LANGUAGE'}/ERR_ACCESS_DISABLED" ))
3555 print FILE
"ERR_ACCESS_DISABLED" ;
3557 print FILE
"ERR_ACCESS_DENIED" ;
3559 print FILE
" IPFire_no_access_ips \n " ;
3560 print FILE
"deny_info " ;
3561 if (( $proxysettings { 'ERR_DESIGN' } eq 'squid' ) && (- e
" $errordir / $proxysettings {'ERR_LANGUAGE'}/ERR_ACCESS_DISABLED" ))
3563 print FILE
"ERR_ACCESS_DISABLED" ;
3565 print FILE
"ERR_ACCESS_DENIED" ;
3567 print FILE
" IPFire_no_access_mac \n " ;
3570 http_access deny IPFire_no_access_ips
3571 http_access deny IPFire_no_access_mac
3576 #Insert acl file and replace __VAR__ with correct values
3577 my $blue_net = '' ; #BLUE empty by default
3579 if ( $netsettings { 'BLUE_DEV' } && $proxysettings { 'ENABLE_BLUE' } eq 'on' ) {
3580 $blue_net = " $blue_cidr " ;
3581 $blue_ip = " $netsettings {'BLUE_ADDRESS'}" ;
3583 if (!- z
$acl_include )
3585 open ( ACL
, " $acl_include " );
3586 print FILE
" \n #Start of custom includes \n\n " ;
3588 $_ =~ s/__GREEN_IP__/$netsettings{'GREEN_ADDRESS'}/ ;
3589 $_ =~ s/__GREEN_NET__/$green_cidr/ ;
3590 $_ =~ s/__BLUE_IP__/$blue_ip/ ;
3591 $_ =~ s/__BLUE_NET__/$blue_net/ ;
3592 $_ =~ s/__PROXY_PORT__/$proxysettings{'PROXY_PORT'}/ ;
3595 print FILE
" \n #End of custom includes \n " ;
3598 if ((!- z
$extgrp ) && ( $proxysettings { 'AUTH_METHOD' } eq 'ncsa' ) && ( $proxysettings { 'NCSA_BYPASS_REDIR' } eq 'on' )) { print FILE
" \n redirector_access deny for_extended_users \n " ; }
3600 # Check if squidclamav is enabled.
3601 if ( $proxysettings { 'ENABLE_CLAMAV' } eq 'on' ) {
3602 print FILE
" \n #Settings for squidclamav: \n " ;
3603 print FILE
"http_port 127.0.0.1: $proxysettings {'PROXY_PORT'} \n " ;
3604 print FILE
"acl purge method PURGE \n " ;
3605 print FILE
"http_access deny to_localhost \n " ;
3606 print FILE
"http_access allow localhost \n " ;
3607 print FILE
"http_access allow purge localhost \n " ;
3608 print FILE
"http_access deny purge \n " ;
3609 print FILE
"url_rewrite_access deny localhost \n " ;
3614 #local machine, no restriction
3615 http_access allow localhost
3617 #GUI admin if local machine connects
3618 http_access allow IPFire_ips IPFire_networks IPFire_http
3619 http_access allow CONNECT IPFire_ips IPFire_networks IPFire_https
3621 #Deny not web services
3625 print FILE
"http_access deny !Safe_ports \n " ;
3629 print FILE
"http_access deny CONNECT !SSL_ports \n " ;
3632 if ( $proxysettings { 'AUTH_METHOD' } eq 'ident' )
3634 print FILE
"#Set ident ACLs \n " ;
3635 if (!- z
$identhosts )
3637 print FILE
"acl on_ident_aware_hosts src \" $identhosts \"\n " ;
3638 print FILE
"ident_lookup_access allow on_ident_aware_hosts \n " ;
3639 print FILE
"ident_lookup_access deny all \n " ;
3641 print FILE
"ident_lookup_access allow all \n " ;
3643 print FILE
"ident_timeout $proxysettings {'IDENT_TIMEOUT'} seconds \n\n " ;
3647 print FILE
"#Set download throttling \n " ;
3649 if ( $netsettings { 'BLUE_DEV' })
3651 print FILE
"delay_pools 2 \n " ;
3653 print FILE
"delay_pools 1 \n " ;
3656 print FILE
"delay_class 1 3 \n " ;
3657 if ( $netsettings { 'BLUE_DEV' }) { print FILE
"delay_class 2 3 \n " ; }
3659 print FILE
"delay_parameters 1 " ;
3660 if ( $proxysettings { 'THROTTLING_GREEN_TOTAL' } eq 'unlimited' )
3664 print FILE
$proxysettings { 'THROTTLING_GREEN_TOTAL' } * 125 ;
3666 print FILE
$proxysettings { 'THROTTLING_GREEN_TOTAL' } * 250 ;
3669 print FILE
" -1/-1 " ;
3670 if ( $proxysettings { 'THROTTLING_GREEN_HOST' } eq 'unlimited' )
3674 print FILE
$proxysettings { 'THROTTLING_GREEN_HOST' } * 125 ;
3676 print FILE
$proxysettings { 'THROTTLING_GREEN_HOST' } * 250 ;
3680 if ( $netsettings { 'BLUE_DEV' })
3682 print FILE
"delay_parameters 2 " ;
3683 if ( $proxysettings { 'THROTTLING_BLUE_TOTAL' } eq 'unlimited' )
3687 print FILE
$proxysettings { 'THROTTLING_BLUE_TOTAL' } * 125 ;
3689 print FILE
$proxysettings { 'THROTTLING_BLUE_TOTAL' } * 250 ;
3691 print FILE
" -1/-1 " ;
3692 if ( $proxysettings { 'THROTTLING_BLUE_HOST' } eq 'unlimited' )
3696 print FILE
$proxysettings { 'THROTTLING_BLUE_HOST' } * 125 ;
3698 print FILE
$proxysettings { 'THROTTLING_BLUE_HOST' } * 250 ;
3703 print FILE
"delay_access 1 deny IPFire_ips \n " ;
3704 if (!- z
$acl_src_unrestricted_ip ) { print FILE
"delay_access 1 deny IPFire_unrestricted_ips \n " ; }
3705 if (!- z
$acl_src_unrestricted_mac ) { print FILE
"delay_access 1 deny IPFire_unrestricted_mac \n " ; }
3706 if (( $proxysettings { 'AUTH_METHOD' } eq 'ncsa' ) && (!- z
$extgrp )) { print FILE
"delay_access 1 deny for_extended_users \n " ; }
3708 if ( $netsettings { 'BLUE_DEV' })
3710 print FILE
"delay_access 1 allow IPFire_green_network" ;
3711 if (!- z
$acl_dst_throttle ) { print FILE
" for_throttled_urls" ; }
3713 print FILE
"delay_access 1 deny all \n " ;
3715 print FILE
"delay_access 1 allow all" ;
3716 if (!- z
$acl_dst_throttle ) { print FILE
" for_throttled_urls" ; }
3720 if ( $netsettings { 'BLUE_DEV' })
3722 print FILE
"delay_access 2 deny IPFire_ips \n " ;
3723 if (!- z
$acl_src_unrestricted_ip ) { print FILE
"delay_access 2 deny IPFire_unrestricted_ips \n " ; }
3724 if (!- z
$acl_src_unrestricted_mac ) { print FILE
"delay_access 2 deny IPFire_unrestricted_mac \n " ; }
3725 if (( $proxysettings { 'AUTH_METHOD' } eq 'ncsa' ) && (!- z
$extgrp )) { print FILE
"delay_access 2 deny for_extended_users \n " ; }
3726 print FILE
"delay_access 2 allow IPFire_blue_network" ;
3727 if (!- z
$acl_dst_throttle ) { print FILE
" for_throttled_urls" ; }
3729 print FILE
"delay_access 2 deny all \n " ;
3732 print FILE
"delay_initial_bucket_level 100 \n " ;
3736 if ( $proxysettings { 'NO_PROXY_LOCAL' } eq 'on' )
3738 print FILE
"#Prevent internal proxy access to Green except IPFire itself \n " ;
3739 print FILE
"http_access deny IPFire_green_servers !IPFire_ips !IPFire_green_network \n\n " ;
3742 if ( $proxysettings { 'NO_PROXY_LOCAL_BLUE' } eq 'on' )
3744 print FILE
"#Prevent internal proxy access from Blue except IPFire itself \n " ;
3745 print FILE
"http_access allow IPFire_blue_network IPFire_blue_servers \n " ;
3746 print FILE
"http_access deny IPFire_blue_network !IPFire_ips IPFire_servers \n\n " ;
3750 #Set custom configured ACLs
3753 if (!- z
$acl_src_banned_ip ) { print FILE
"http_access deny IPFire_banned_ips \n " ; }
3754 if (!- z
$acl_src_banned_mac ) { print FILE
"http_access deny IPFire_banned_mac \n " ; }
3756 if ((!- z
$acl_dst_noauth ) && (!( $proxysettings { 'AUTH_METHOD' } eq 'none' )))
3758 if (!- z
$acl_src_unrestricted_ip )
3760 if (!- z
$acl_dst_noauth_net ) { print FILE
"http_access allow IPFire_unrestricted_ips to_ipaddr_without_auth \n " ; }
3761 if (!- z
$acl_dst_noauth_dom ) { print FILE
"http_access allow IPFire_unrestricted_ips to_domains_without_auth \n " ; }
3762 if (!- z
$acl_dst_noauth_url ) { print FILE
"http_access allow IPFire_unrestricted_ips to_hosts_without_auth \n " ; }
3764 if (!- z
$acl_src_unrestricted_mac )
3766 if (!- z
$acl_dst_noauth_net ) { print FILE
"http_access allow IPFire_unrestricted_mac to_ipaddr_without_auth \n " ; }
3767 if (!- z
$acl_dst_noauth_dom ) { print FILE
"http_access allow IPFire_unrestricted_mac to_domains_without_auth \n " ; }
3768 if (!- z
$acl_dst_noauth_url ) { print FILE
"http_access allow IPFire_unrestricted_mac to_hosts_without_auth \n " ; }
3770 if (!- z
$acl_dst_noauth_net )
3772 print FILE
"http_access allow IPFire_networks" ;
3773 if ( $proxysettings { 'TIME_ACCESS_MODE' } eq 'deny' ) {
3774 print FILE
" !within_timeframe" ;
3776 print FILE
" within_timeframe" ; }
3777 if ( $proxysettings { 'ENABLE_BROWSER_CHECK' } eq 'on' ) { print FILE
" with_allowed_useragents" ; }
3778 print FILE
" to_ipaddr_without_auth \n " ;
3780 if (!- z
$acl_dst_noauth_dom )
3782 print FILE
"http_access allow IPFire_networks" ;
3783 if ( $proxysettings { 'TIME_ACCESS_MODE' } eq 'deny' ) {
3784 print FILE
" !within_timeframe" ;
3786 print FILE
" within_timeframe" ; }
3787 if ( $proxysettings { 'ENABLE_BROWSER_CHECK' } eq 'on' ) { print FILE
" with_allowed_useragents" ; }
3788 print FILE
" to_domains_without_auth \n " ;
3790 if (!- z
$acl_dst_noauth_url )
3792 print FILE
"http_access allow IPFire_networks" ;
3793 if ( $proxysettings { 'TIME_ACCESS_MODE' } eq 'deny' ) {
3794 print FILE
" !within_timeframe" ;
3796 print FILE
" within_timeframe" ; }
3797 if ( $proxysettings { 'ENABLE_BROWSER_CHECK' } eq 'on' ) { print FILE
" with_allowed_useragents" ; }
3798 print FILE
" to_hosts_without_auth \n " ;
3802 if (( $proxysettings { 'AUTH_METHOD' } eq 'ident' ) && ( $proxysettings { 'IDENT_REQUIRED' } eq 'on' ) && ( $proxysettings { 'AUTH_ALWAYS_REQUIRED' } eq 'on' ))
3804 print FILE
"http_access deny !for_inetusers" ;
3805 if (!- z
$identhosts ) { print FILE
" on_ident_aware_hosts" ; }
3810 ( $proxysettings { 'AUTH_METHOD' } eq 'ident' ) &&
3811 ( $proxysettings { 'AUTH_ALWAYS_REQUIRED' } eq 'on' ) &&
3812 ( $proxysettings { 'IDENT_ENABLE_ACL' } eq 'on' ) &&
3813 ( $proxysettings { 'IDENT_USER_ACL' } eq 'negative' ) &&
3814 (!- z
" $identdir /identauth.denyusers" )
3817 print FILE
"http_access deny for_acl_users" ;
3818 if (( $proxysettings { 'AUTH_METHOD' } eq 'ident' ) && (!- z
" $identdir /hosts" )) { print FILE
" on_ident_aware_hosts" ; }
3822 if (!- z
$acl_src_unrestricted_ip )
3824 print FILE
"http_access allow IPFire_unrestricted_ips" ;
3825 if ( $proxysettings { 'AUTH_ALWAYS_REQUIRED' } eq 'on' )
3827 if ( $proxysettings { 'AUTH_METHOD' } eq 'ncsa' )
3829 if (!- z
$disgrp ) { print FILE
" !for_disabled_users" ; } else { print FILE
" for_inetusers" ; }
3831 if (( $proxysettings { 'AUTH_METHOD' } eq 'ldap' ) || (( $proxysettings { 'AUTH_METHOD' } eq 'ntlm' ) && ( $proxysettings { 'NTLM_ENABLE_INT_AUTH' } eq 'off' )) || ( $proxysettings { 'AUTH_METHOD' } eq 'radius' ))
3833 print FILE
" for_inetusers" ;
3835 if (( $proxysettings { 'AUTH_METHOD' } eq 'ntlm' ) && ( $proxysettings { 'NTLM_ENABLE_INT_AUTH' } eq 'on' ))
3837 if ( $proxysettings { 'NTLM_ENABLE_ACL' } eq 'on' )
3839 if (( $proxysettings { 'NTLM_USER_ACL' } eq 'positive' ) && (!- z
" $ntlmdir /msntauth.allowusers" ))
3841 print FILE
" for_acl_users" ;
3843 if (( $proxysettings { 'NTLM_USER_ACL' } eq 'negative' ) && (!- z
" $ntlmdir /msntauth.denyusers" ))
3845 print FILE
" !for_acl_users" ;
3847 } else { print FILE
" for_inetusers" ; }
3849 if (( $proxysettings { 'AUTH_METHOD' } eq 'radius' ) && ( $proxysettings { 'RADIUS_ENABLE_ACL' } eq 'on' ))
3851 if ( $proxysettings { 'RADIUS_ENABLE_ACL' } eq 'on' )
3853 if (( $proxysettings { 'RADIUS_USER_ACL' } eq 'positive' ) && (!- z
" $raddir /radauth.allowusers" ))
3855 print FILE
" for_acl_users" ;
3857 if (( $proxysettings { 'RADIUS_USER_ACL' } eq 'negative' ) && (!- z
" $raddir /radauth.denyusers" ))
3859 print FILE
" !for_acl_users" ;
3861 } else { print FILE
" for_inetusers" ; }
3867 if (!- z
$acl_src_unrestricted_mac )
3869 print FILE
"http_access allow IPFire_unrestricted_mac" ;
3870 if ( $proxysettings { 'AUTH_ALWAYS_REQUIRED' } eq 'on' )
3872 if ( $proxysettings { 'AUTH_METHOD' } eq 'ncsa' )
3874 if (!- z
$disgrp ) { print FILE
" !for_disabled_users" ; } else { print FILE
" for_inetusers" ; }
3876 if (( $proxysettings { 'AUTH_METHOD' } eq 'ldap' ) || (( $proxysettings { 'AUTH_METHOD' } eq 'ntlm' ) && ( $proxysettings { 'NTLM_ENABLE_INT_AUTH' } eq 'off' )) || ( $proxysettings { 'AUTH_METHOD' } eq 'radius' ))
3878 print FILE
" for_inetusers" ;
3880 if (( $proxysettings { 'AUTH_METHOD' } eq 'ntlm' ) && ( $proxysettings { 'NTLM_ENABLE_INT_AUTH' } eq 'on' ))
3882 if ( $proxysettings { 'NTLM_ENABLE_ACL' } eq 'on' )
3884 if (( $proxysettings { 'NTLM_USER_ACL' } eq 'positive' ) && (!- z
" $ntlmdir /msntauth.allowusers" ))
3886 print FILE
" for_acl_users" ;
3888 if (( $proxysettings { 'NTLM_USER_ACL' } eq 'negative' ) && (!- z
" $ntlmdir /msntauth.denyusers" ))
3890 print FILE
" !for_acl_users" ;
3892 } else { print FILE
" for_inetusers" ; }
3894 if (( $proxysettings { 'AUTH_METHOD' } eq 'radius' ) && ( $proxysettings { 'RADIUS_ENABLE_ACL' } eq 'on' ))
3896 if ( $proxysettings { 'RADIUS_ENABLE_ACL' } eq 'on' )
3898 if (( $proxysettings { 'RADIUS_USER_ACL' } eq 'positive' ) && (!- z
" $raddir /radauth.allowusers" ))
3900 print FILE
" for_acl_users" ;
3902 if (( $proxysettings { 'RADIUS_USER_ACL' } eq 'negative' ) && (!- z
" $raddir /radauth.denyusers" ))
3904 print FILE
" !for_acl_users" ;
3906 } else { print FILE
" for_inetusers" ; }
3912 if ( $proxysettings { 'AUTH_METHOD' } eq 'ncsa' )
3914 if (!- z
$disgrp ) { print FILE
"http_access deny for_disabled_users \n " ; }
3915 if (!- z
$extgrp ) { print FILE
"http_access allow IPFire_networks for_extended_users \n " ; }
3920 ( $proxysettings { 'AUTH_METHOD' } eq 'ntlm' ) &&
3921 ( $proxysettings { 'NTLM_ENABLE_INT_AUTH' } eq 'on' ) &&
3922 ( $proxysettings { 'NTLM_ENABLE_ACL' } eq 'on' ) &&
3923 ( $proxysettings { 'NTLM_USER_ACL' } eq 'negative' ) &&
3924 (!- z
" $ntlmdir /msntauth.denyusers" )
3928 ( $proxysettings { 'AUTH_METHOD' } eq 'radius' ) &&
3929 ( $proxysettings { 'RADIUS_ENABLE_ACL' } eq 'on' ) &&
3930 ( $proxysettings { 'RADIUS_USER_ACL' } eq 'negative' ) &&
3931 (!- z
" $raddir /radauth.denyusers" )
3935 ( $proxysettings { 'AUTH_METHOD' } eq 'ident' ) &&
3936 ( $proxysettings { 'AUTH_ALWAYS_REQUIRED' } eq 'off' ) &&
3937 ( $proxysettings { 'IDENT_ENABLE_ACL' } eq 'on' ) &&
3938 ( $proxysettings { 'IDENT_USER_ACL' } eq 'negative' ) &&
3939 (!- z
" $identdir /identauth.denyusers" )
3943 print FILE
"http_access deny for_acl_users" ;
3944 if (( $proxysettings { 'AUTH_METHOD' } eq 'ident' ) && (!- z
" $identdir /hosts" )) { print FILE
" on_ident_aware_hosts" ; }
3948 if (( $proxysettings { 'AUTH_METHOD' } eq 'ident' ) && ( $proxysettings { 'IDENT_REQUIRED' } eq 'on' ) && (!- z
" $identhosts " ))
3950 print FILE
"http_access allow" ;
3951 if ( $proxysettings { 'TIME_ACCESS_MODE' } eq 'deny' ) {
3952 print FILE
" !within_timeframe" ;
3954 print FILE
" within_timeframe" ; }
3955 if ( $proxysettings { 'ENABLE_BROWSER_CHECK' } eq 'on' ) { print FILE
" with_allowed_useragents" ; }
3956 print FILE
" !on_ident_aware_hosts \n " ;
3959 print FILE
"http_access allow IPFire_networks" ;
3962 ( $proxysettings { 'AUTH_METHOD' } eq 'ntlm' ) &&
3963 ( $proxysettings { 'NTLM_ENABLE_INT_AUTH' } eq 'on' ) &&
3964 ( $proxysettings { 'NTLM_ENABLE_ACL' } eq 'on' ) &&
3965 ( $proxysettings { 'NTLM_USER_ACL' } eq 'positive' ) &&
3966 (!- z
" $ntlmdir /msntauth.allowusers" )
3970 ( $proxysettings { 'AUTH_METHOD' } eq 'radius' ) &&
3971 ( $proxysettings { 'RADIUS_ENABLE_ACL' } eq 'on' ) &&
3972 ( $proxysettings { 'RADIUS_USER_ACL' } eq 'positive' ) &&
3973 (!- z
" $raddir /radauth.allowusers" )
3977 ( $proxysettings { 'AUTH_METHOD' } eq 'ident' ) &&
3978 ( $proxysettings { 'IDENT_REQUIRED' } eq 'on' ) &&
3979 ( $proxysettings { 'IDENT_ENABLE_ACL' } eq 'on' ) &&
3980 ( $proxysettings { 'IDENT_USER_ACL' } eq 'positive' ) &&
3981 (!- z
" $identdir /identauth.allowusers" )
3985 print FILE
" for_acl_users" ;
3986 } elsif (((!( $proxysettings { 'AUTH_METHOD' } eq 'none' )) && (!( $proxysettings { 'AUTH_METHOD' } eq 'ident' ))) ||
3987 (( $proxysettings { 'AUTH_METHOD' } eq 'ident' ) && ( $proxysettings { 'IDENT_REQUIRED' } eq 'on' ))) {
3988 print FILE
" for_inetusers" ;
3990 if ((!( $proxysettings { 'AUTH_MAX_USERIP' } eq '' )) && (!( $proxysettings { 'AUTH_METHOD' } eq 'none' )) && (!( $proxysettings { 'AUTH_METHOD' } eq 'ident' )))
3992 print FILE
" !concurrent" ;
3994 if ( $proxysettings { 'TIME_ACCESS_MODE' } eq 'deny' ) {
3995 print FILE
" !within_timeframe" ;
3997 print FILE
" within_timeframe" ; }
3998 if ( $proxysettings { 'ENABLE_BROWSER_CHECK' } eq 'on' ) { print FILE
" with_allowed_useragents" ; }
4001 print FILE
"http_access deny all \n\n " ;
4003 if (( $proxysettings { 'FORWARD_IPADDRESS' } eq 'off' ) || ( $proxysettings { 'FORWARD_VIA' } eq 'off' ) ||
4004 (!( $proxysettings { 'FAKE_USERAGENT' } eq '' )) || (!( $proxysettings { 'FAKE_REFERER' } eq '' )))
4006 print FILE
"#Strip HTTP Header \n " ;
4008 if ( $proxysettings { 'FORWARD_IPADDRESS' } eq 'off' )
4010 print FILE
"request_header_access X-Forwarded-For deny all \n " ;
4011 print FILE
"reply_header_access X-Forwarded-For deny all \n " ;
4013 if ( $proxysettings { 'FORWARD_VIA' } eq 'off' )
4015 print FILE
"request_header_access Via deny all \n " ;
4016 print FILE
"reply_header_access Via deny all \n " ;
4018 if (!( $proxysettings { 'FAKE_USERAGENT' } eq '' ))
4020 print FILE
"request_header_access User-Agent deny all \n " ;
4021 print FILE
"reply_header_access User-Agent deny all \n " ;
4023 if (!( $proxysettings { 'FAKE_REFERER' } eq '' ))
4025 print FILE
"request_header_access Referer deny all \n " ;
4026 print FILE
"reply_header_access Referer deny all \n " ;
4031 if ((!( $proxysettings { 'FAKE_USERAGENT' } eq '' )) || (!( $proxysettings { 'FAKE_REFERER' } eq '' )))
4033 if (!( $proxysettings { 'FAKE_USERAGENT' } eq '' ))
4035 print FILE
"header_replace User-Agent $proxysettings {'FAKE_USERAGENT'} \n " ;
4037 if (!( $proxysettings { 'FAKE_REFERER' } eq '' ))
4039 print FILE
"header_replace Referer $proxysettings {'FAKE_REFERER'} \n " ;
4045 if ( $proxysettings { 'SUPPRESS_VERSION' } eq 'on' ) { print FILE
"httpd_suppress_version_string on \n\n " }
4047 if ((!- z
$mimetypes ) && ( $proxysettings { 'ENABLE_MIME_FILTER' } eq 'on' )) {
4048 if (!- z
$acl_src_unrestricted_ip ) { print FILE
"http_reply_access allow IPFire_unrestricted_ips \n " ; }
4049 if (!- z
$acl_src_unrestricted_mac ) { print FILE
"http_reply_access allow IPFire_unrestricted_mac \n " ; }
4050 if ( $proxysettings { 'AUTH_METHOD' } eq 'ncsa' )
4052 if (!- z
$extgrp ) { print FILE
"http_reply_access allow for_extended_users \n " ; }
4054 print FILE
"http_reply_access deny blocked_mimetypes \n " ;
4055 print FILE
"http_reply_access allow all \n\n " ;
4058 print FILE
"visible_hostname" ;
4059 if ( $proxysettings { 'VISIBLE_HOSTNAME' } eq '' )
4061 print FILE
" $mainsettings {'HOSTNAME'}. $mainsettings {'DOMAINNAME'} \n\n " ;
4063 print FILE
" $proxysettings {'VISIBLE_HOSTNAME'} \n\n " ;
4066 if (!( $proxysettings { 'ADMIN_MAIL_ADDRESS' } eq '' )) { print FILE
"cache_mgr $proxysettings {'ADMIN_MAIL_ADDRESS'} \n " ; }
4067 if (!( $proxysettings { 'ADMIN_PASSWORD' } eq '' )) { print FILE
"cachemgr_passwd $proxysettings {'ADMIN_PASSWORD'} all \n " ; }
4070 print FILE
"max_filedescriptors $proxysettings {'FILEDESCRIPTORS'} \n\n " ;
4072 # Write the parent proxy info, if needed.
4073 if ( $remotehost ne '' )
4075 print FILE
"cache_peer $remotehost parent $remoteport 3130 default no-query" ;
4077 # Enter authentication for the parent cache. Option format is
4078 # login=user:password ($proxy1='YES')
4079 # login=PASS ($proxy1='PASS')
4080 # login=*:password ($proxysettings{'FORWARD_USERNAME'} eq 'on')
4081 if (( $proxy1 eq 'YES' ) || ( $proxy1 eq 'PASS' ))
4083 print FILE
" login= $proxysettings {'UPSTREAM_USER'}" ;
4084 if ( $proxy1 eq 'YES' ) { print FILE
": $proxysettings {'UPSTREAM_PASSWORD'}" ; }
4086 elsif ( $proxysettings { 'FORWARD_USERNAME' } eq 'on' ) { print FILE
" login=*:password" ; }
4088 print FILE
" \n always_direct allow IPFire_ips \n " ;
4089 print FILE
"never_direct allow all \n\n " ;
4091 if (( $proxysettings { 'ENABLE_FILTER' } eq 'on' ) || ( $proxysettings { 'ENABLE_UPDXLRATOR' } eq 'on' ) || ( $proxysettings { 'ENABLE_CLAMAV' } eq 'on' ))
4093 print FILE
"url_rewrite_program /usr/sbin/redirect_wrapper \n " ;
4094 print FILE
"url_rewrite_children $proxysettings {'CHILDREN'} \n\n " ;
4097 # Include file with user defined settings.
4098 if (- e
"/etc/squid/squid.conf.local" ) {
4099 print FILE
"include /etc/squid/squid.conf.local \n " ;
4103 # Proxy settings for squidclamav - if installed.
4105 # Check if squidclamav is enabled.
4106 if ( $proxysettings { 'ENABLE_CLAMAV' } eq 'on' ) {
4108 my $configfile = '/etc/squidclamav.conf' ;
4110 my $data = & General
:: read_file_utf8
( $configfile );
4111 $data =~ s/squid_port [0-9]+/squid_port $proxysettings{'PROXY_PORT'}/g ;
4112 & General
:: write_file_utf8
( $configfile , $data );
4116 # -------------------------------------------------------------------
4120 my ( $str_user , $str_pass , $str_group ) = @_ ;
4121 my @groupmembers =();
4123 if ( $str_pass eq 'lEaVeAlOnE' )
4125 open ( FILE
, " $userdb " );
4126 @groupmembers = < FILE
>;
4128 foreach $line ( @groupmembers ) { if ( $line =~ /^$str_user:/i ) { $str_pass = substr ( $line , index ( $line , ":" )); } }
4129 & deluser
( $str_user );
4130 open ( FILE
, ">> $userdb " );
4132 print FILE
" $str_user $str_pass " ;
4135 & deluser
( $str_user );
4137 my $htpasswd = new Apache
:: Htpasswd
( " $userdb " );
4138 $htpasswd -> htpasswd ( $str_user , $str_pass );
4141 if ( $str_group eq 'standard' ) { open ( FILE
, ">> $stdgrp " );
4142 } elsif ( $str_group eq 'extended' ) { open ( FILE
, ">> $extgrp " );
4143 } elsif ( $str_group eq 'disabled' ) { open ( FILE
, ">> $disgrp " ); }
4145 print FILE
" $str_user \n " ;
4151 # -------------------------------------------------------------------
4155 my ( $str_user ) = @_ ;
4157 my @groupmembers =();
4160 foreach $groupfile ( $stdgrp , $extgrp , $disgrp )
4163 open ( FILE
, " $groupfile " );
4164 @groupmembers = < FILE
>;
4166 foreach $line ( @groupmembers ) { if (!( $line =~ /^$str_user$/i )) { push ( @templist , $line ); } }
4167 open ( FILE
, "> $groupfile " );
4169 print FILE
@templist ;
4174 open ( FILE
, " $userdb " );
4175 @groupmembers = < FILE
>;
4177 foreach $line ( @groupmembers ) { if (!( $line =~ /^$str_user:/i )) { push ( @templist , $line ); } }
4178 open ( FILE
, "> $userdb " );
4180 print FILE
@templist ;
4186 # -------------------------------------------------------------------
4190 open ( FILE
, ">${General::swroot}/proxy/cachemgr.conf" );
4192 print FILE
" $netsettings {'GREEN_ADDRESS'}: $proxysettings {'PROXY_PORT'} \n " ;
4193 print FILE
"localhost" ;
4198 # -------------------------------------------------------------------