]> git.ipfire.org Git - ipfire-2.x.git/blob - html/cgi-bin/proxy.cgi
rtl8189fs: add realtek wlan driver
[ipfire-2.x.git] / html / cgi-bin / proxy.cgi
1 #!/usr/bin/perl
2 ###############################################################################
3 # #
4 # IPFire.org - A linux based firewall #
5 # Copyright (C) 2007-2021 IPFire Team <info@ipfire.org> #
6 # #
7 # This program is free software: you can redistribute it and/or modify #
8 # it under the terms of the GNU General Public License as published by #
9 # the Free Software Foundation, either version 3 of the License, or #
10 # (at your option) any later version. #
11 # #
12 # This program is distributed in the hope that it will be useful, #
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of #
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
15 # GNU General Public License for more details. #
16 # #
17 # You should have received a copy of the GNU General Public License #
18 # along with this program. If not, see <http://www.gnu.org/licenses/>. #
19 # #
20 ###############################################################################
21
22 use strict;
23 use Apache::Htpasswd;
24 use Scalar::Util qw(looks_like_number);
25
26 # enable only the following on debugging purpose
27 #use warnings;
28 #use CGI::Carp 'fatalsToBrowser';
29
30 require '/var/ipfire/general-functions.pl';
31 require "${General::swroot}/lang.pl";
32 require "${General::swroot}/header.pl";
33
34 require "${General::swroot}/ids-functions.pl";
35
36 my @squidversion = &General::system_output("/usr/sbin/squid", "-v");
37 my $http_port='81';
38 my $https_port='444';
39
40 my %color = ();
41 my %mainsettings = ();
42 &General::readhash("${General::swroot}/main/settings", \%mainsettings);
43 &General::readhash("/srv/web/ipfire/html/themes/ipfire/include/colors.txt", \%color);
44
45 my %proxysettings=();
46 my %netsettings=();
47 my %filtersettings=();
48 my %xlratorsettings=();
49 my %stdproxysettings=();
50 my %mainsettings=();
51
52 my %checked=();
53 my %selected=();
54
55 my @throttle_limits=(64,128,256,512,1024,1536,2048,3072,4096,5120,6144,7168,8192,10240,16384,20480,51200,102400);
56
57 my $def_ports_safe="80 # http\n21 # ftp\n443 # https\n563 # snews\n70 # gopher\n210 # wais\n1025-65535 # unregistered ports\n280 # http-mgmt\n488 # gss-http\n591 # filemaker\n777 # multiling http\n800 # Squids port (for icons)\n";
58 my $def_ports_ssl="443 # https\n563 # snews\n";
59
60 my $hintcolour='#FFFFCC';
61 my $ncsa_buttontext='';
62 my $language='';
63 my $i=0;
64 my $n=0;
65 my $id=0;
66 my $line='';
67 my $user='';
68 my @userlist=();
69 my @grouplist=();
70 my @temp=();
71 my @templist=();
72
73 my $cachemem=0;
74 my $proxy1='';
75 my $proxy2='';
76 my $browser_regexp='';
77 my $needhup = 0;
78 my $errormessage='';
79
80 my $acldir = "${General::swroot}/proxy/advanced/acls";
81 my $ncsadir = "${General::swroot}/proxy/advanced/ncsa";
82 my $raddir = "${General::swroot}/proxy/advanced/radius";
83 my $identdir = "${General::swroot}/proxy/advanced/ident";
84 my $credir = "${General::swroot}/proxy/advanced/cre";
85
86 my $userdb = "$ncsadir/passwd";
87 my $stdgrp = "$ncsadir/standard.grp";
88 my $extgrp = "$ncsadir/extended.grp";
89 my $disgrp = "$ncsadir/disabled.grp";
90
91 my $mimetypes = "${General::swroot}/proxy/advanced/mimetypes";
92 my $throttled_urls = "${General::swroot}/proxy/advanced/throttle";
93
94 my $cre_enabled = "${General::swroot}/proxy/advanced/cre/enable";
95 my $cre_groups = "${General::swroot}/proxy/advanced/cre/classrooms";
96 my $cre_svhosts = "${General::swroot}/proxy/advanced/cre/supervisors";
97
98 my $identhosts = "$identdir/hosts";
99
100 my $authdir = "/usr/lib/squid";
101 my $errordir = "/usr/lib/squid/errors";
102
103 my $acl_src_subnets = "$acldir/src_subnets.acl";
104 my $acl_src_banned_ip = "$acldir/src_banned_ip.acl";
105 my $acl_src_banned_mac = "$acldir/src_banned_mac.acl";
106 my $acl_src_unrestricted_ip = "$acldir/src_unrestricted_ip.acl";
107 my $acl_src_unrestricted_mac = "$acldir/src_unrestricted_mac.acl";
108 my $acl_src_noaccess_ip = "$acldir/src_noaccess_ip.acl";
109 my $acl_src_noaccess_mac = "$acldir/src_noaccess_mac.acl";
110 my $acl_dst_noauth = "$acldir/dst_noauth.acl";
111 my $acl_dst_noauth_dom = "$acldir/dst_noauth_dom.acl";
112 my $acl_dst_noauth_net = "$acldir/dst_noauth_net.acl";
113 my $acl_dst_noauth_url = "$acldir/dst_noauth_url.acl";
114 my $acl_dst_nocache = "$acldir/dst_nocache.acl";
115 my $acl_dst_nocache_dom = "$acldir/dst_nocache_dom.acl";
116 my $acl_dst_nocache_net = "$acldir/dst_nocache_net.acl";
117 my $acl_dst_nocache_url = "$acldir/dst_nocache_url.acl";
118 my $acl_dst_throttle = "$acldir/dst_throttle.acl";
119 my $acl_ports_safe = "$acldir/ports_safe.acl";
120 my $acl_ports_ssl = "$acldir/ports_ssl.acl";
121 my $acl_include = "$acldir/include.acl";
122
123 my $acl_dst_noproxy_url = "$acldir/dst_noproxy_url.acl";
124 my $acl_dst_noproxy_ip = "$acldir/dst_noproxy_ip.acl";
125
126 my $updaccelversion = 'n/a';
127 my $urlfilterversion = 'n/a';
128
129 unless (-d "$acldir") { mkdir("$acldir"); }
130 unless (-d "$ncsadir") { mkdir("$ncsadir"); }
131 unless (-d "$raddir") { mkdir("$raddir"); }
132 unless (-d "$identdir") { mkdir("$identdir"); }
133 unless (-d "$credir") { mkdir("$credir"); }
134
135 unless (-e $cre_groups) { &General::system("touch", "$cre_groups"); }
136 unless (-e $cre_svhosts) { &General::system("touch $cre_svhosts"); }
137
138 unless (-e $userdb) { &General::system("touch", "$userdb"); }
139 unless (-e $stdgrp) { &General::system("touch", "$stdgrp"); }
140 unless (-e $extgrp) { &General::system("touch", "$extgrp"); }
141 unless (-e $disgrp) { &General::system("touch", "$disgrp"); }
142
143 unless (-e $acl_src_subnets) { &General::system("touch", "$acl_src_subnets"); }
144 unless (-e $acl_src_banned_ip) { &General::system("touch", "$acl_src_banned_ip"); }
145 unless (-e $acl_src_banned_mac) { &General::system("touch", "$acl_src_banned_mac"); }
146 unless (-e $acl_src_unrestricted_ip) { &General::system("touch", "$acl_src_unrestricted_ip"); }
147 unless (-e $acl_src_unrestricted_mac) { &General::system("touch", "$acl_src_unrestricted_mac"); }
148 unless (-e $acl_src_noaccess_ip) { &General::system("touch", "$acl_src_noaccess_ip"); }
149 unless (-e $acl_src_noaccess_mac) { &General::system("touch", "$acl_src_noaccess_mac"); }
150 unless (-e $acl_dst_noauth) { &General::system("touch", "$acl_dst_noauth"); }
151 unless (-e $acl_dst_noauth_dom) { &General::system("touch", "$acl_dst_noauth_dom"); }
152 unless (-e $acl_dst_noauth_net) { &General::system("touch", "$acl_dst_noauth_net"); }
153 unless (-e $acl_dst_noauth_url) { &General::system("touch", "$acl_dst_noauth_url"); }
154 unless (-e $acl_dst_nocache) { &General::system("touch", "$acl_dst_nocache"); }
155 unless (-e $acl_dst_nocache_dom) { &General::system("touch", "$acl_dst_nocache_dom"); }
156 unless (-e $acl_dst_nocache_net) { &General::system("touch", "$acl_dst_nocache_net"); }
157 unless (-e $acl_dst_nocache_url) { &General::system("touch", "$acl_dst_nocache_url"); }
158 unless (-e $acl_dst_throttle) { &General::system("touch", "$acl_dst_throttle"); }
159 unless (-e $acl_ports_safe) { &General::system("touch", "$acl_ports_safe"); }
160 unless (-e $acl_ports_ssl) { &General::system("touch", "$acl_ports_ssl"); }
161 unless (-e $acl_include) { &General::system("touch", "$acl_include"); }
162
163 unless (-e $mimetypes) { &General::system("touch", "$mimetypes"); }
164
165 my $HAVE_NTLM_AUTH = (-e "/usr/bin/ntlm_auth");
166
167 &General::readhash("${General::swroot}/ethernet/settings", \%netsettings);
168 &General::readhash("${General::swroot}/main/settings", \%mainsettings);
169
170 my $green_cidr = "";
171 if (&Header::green_used() && $netsettings{'GREEN_DEV'}) {
172 $green_cidr = &General::ipcidr("$netsettings{'GREEN_NETADDRESS'}\/$netsettings{'GREEN_NETMASK'}");
173 }
174
175 my $blue_cidr = "";
176 if (&Header::blue_used() && $netsettings{'BLUE_DEV'}) {
177 $blue_cidr = &General::ipcidr("$netsettings{'BLUE_NETADDRESS'}\/$netsettings{'BLUE_NETMASK'}");
178 }
179
180 &Header::showhttpheaders();
181
182 $proxysettings{'ACTION'} = '';
183 $proxysettings{'VALID'} = '';
184
185 $proxysettings{'ENABLE'} = 'off';
186 $proxysettings{'ENABLE_BLUE'} = 'off';
187 $proxysettings{'TRANSPARENT'} = 'off';
188 $proxysettings{'TRANSPARENT_BLUE'} = 'off';
189 $proxysettings{'PROXY_PORT'} = '800';
190 $proxysettings{'TRANSPARENT_PORT'} = '3128';
191 $proxysettings{'VISIBLE_HOSTNAME'} = '';
192 $proxysettings{'ADMIN_MAIL_ADDRESS'} = '';
193 $proxysettings{'ADMIN_PASSWORD'} = '';
194 $proxysettings{'ERR_LANGUAGE'} = 'en';
195 $proxysettings{'ERR_DESIGN'} = 'ipfire';
196 $proxysettings{'FORWARD_VIA'} = 'off';
197 $proxysettings{'FORWARD_IPADDRESS'} = 'off';
198 $proxysettings{'FORWARD_USERNAME'} = 'off';
199 $proxysettings{'NO_CONNECTION_AUTH'} = 'off';
200 $proxysettings{'UPSTREAM_PROXY'} = '';
201 $proxysettings{'UPSTREAM_USER'} = '';
202 $proxysettings{'UPSTREAM_PASSWORD'} = '';
203 $proxysettings{'LOGGING'} = 'off';
204 $proxysettings{'CACHEMGR'} = 'off';
205 $proxysettings{'LOGQUERY'} = 'off';
206 $proxysettings{'LOGUSERAGENT'} = 'off';
207 $proxysettings{'FILEDESCRIPTORS'} = '16384';
208 $proxysettings{'CACHE_MEM'} = '128';
209 $proxysettings{'CACHE_SIZE'} = '0';
210 $proxysettings{'MAX_SIZE'} = '4096';
211 $proxysettings{'MIN_SIZE'} = '0';
212 $proxysettings{'MEM_POLICY'} = 'LRU';
213 $proxysettings{'CACHE_POLICY'} = 'LRU';
214 $proxysettings{'L1_DIRS'} = '16';
215 $proxysettings{'OFFLINE_MODE'} = 'off';
216 $proxysettings{'CACHE_DIGESTS'} = 'off';
217 $proxysettings{'CLASSROOM_EXT'} = 'off';
218 $proxysettings{'SUPERVISOR_PASSWORD'} = '';
219 $proxysettings{'NO_PROXY_LOCAL'} = 'off';
220 $proxysettings{'NO_PROXY_LOCAL_BLUE'} = 'off';
221 $proxysettings{'TIME_ACCESS_MODE'} = 'allow';
222 $proxysettings{'TIME_FROM_HOUR'} = '00';
223 $proxysettings{'TIME_FROM_MINUTE'} = '00';
224 $proxysettings{'TIME_TO_HOUR'} = '24';
225 $proxysettings{'TIME_TO_MINUTE'} = '00';
226 $proxysettings{'MAX_OUTGOING_SIZE'} = '0';
227 $proxysettings{'MAX_INCOMING_SIZE'} = '0';
228 $proxysettings{'THROTTLING_GREEN_TOTAL'} = 'unlimited';
229 $proxysettings{'THROTTLING_GREEN_HOST'} = 'unlimited';
230 $proxysettings{'THROTTLING_BLUE_TOTAL'} = 'unlimited';
231 $proxysettings{'THROTTLING_BLUE_HOST'} = 'unlimited';
232 $proxysettings{'ASNBL_FASTFLUX_DETECTION'} = 'off';
233 $proxysettings{'ASNBL_FASTFLUX_THRESHOLD'} = '5';
234 $proxysettings{'ASNBL_SELECANN_DETECTION'} = 'off';
235 $proxysettings{'ENABLE_MIME_FILTER'} = 'off';
236 $proxysettings{'AUTH_METHOD'} = 'none';
237 $proxysettings{'AUTH_REALM'} = '';
238 $proxysettings{'AUTH_MAX_USERIP'} = '';
239 $proxysettings{'AUTH_CACHE_TTL'} = '60';
240 $proxysettings{'AUTH_IPCACHE_TTL'} = '0';
241 $proxysettings{'AUTH_CHILDREN'} = '5';
242 $proxysettings{'NCSA_MIN_PASS_LEN'} = '6';
243 $proxysettings{'NCSA_BYPASS_REDIR'} = 'off';
244 $proxysettings{'NCSA_USERNAME'} = '';
245 $proxysettings{'NCSA_GROUP'} = '';
246 $proxysettings{'NCSA_PASS'} = '';
247 $proxysettings{'NCSA_PASS_CONFIRM'} = '';
248 $proxysettings{'LDAP_BASEDN'} = '';
249 $proxysettings{'LDAP_TYPE'} = 'ADS';
250 $proxysettings{'LDAP_SERVER'} = '';
251 $proxysettings{'LDAP_PORT'} = '389';
252 $proxysettings{'LDAP_BINDDN_USER'} = '';
253 $proxysettings{'LDAP_BINDDN_PASS'} = '';
254 $proxysettings{'LDAP_GROUP'} = '';
255 $proxysettings{'NTLM_AUTH_GROUP'} = '';
256 $proxysettings{'NTLM_AUTH_BASIC'} = 'off';
257 $proxysettings{'NTLM_DOMAIN'} = '';
258 $proxysettings{'NTLM_PDC'} = '';
259 $proxysettings{'NTLM_BDC'} = '';
260 $proxysettings{'NTLM_ENABLE_ACL'} = 'off';
261 $proxysettings{'NTLM_USER_ACL'} = 'positive';
262 $proxysettings{'RADIUS_SERVER'} = '';
263 $proxysettings{'RADIUS_PORT'} = '1812';
264 $proxysettings{'RADIUS_IDENTIFIER'} = '';
265 $proxysettings{'RADIUS_SECRET'} = '';
266 $proxysettings{'RADIUS_ENABLE_ACL'} = 'off';
267 $proxysettings{'RADIUS_USER_ACL'} = 'positive';
268 $proxysettings{'IDENT_REQUIRED'} = 'off';
269 $proxysettings{'IDENT_TIMEOUT'} = '10';
270 $proxysettings{'IDENT_ENABLE_ACL'} = 'off';
271 $proxysettings{'IDENT_USER_ACL'} = 'positive';
272 $proxysettings{'ENABLE_FILTER'} = 'off';
273 $proxysettings{'ENABLE_UPDXLRATOR'} = 'off';
274 $proxysettings{'ENABLE_CLAMAV'} = 'off';
275
276 $ncsa_buttontext = $Lang::tr{'advproxy NCSA create user'};
277
278 &Header::getcgihash(\%proxysettings);
279
280 if ($proxysettings{'THROTTLING_GREEN_TOTAL'} eq 0) {$proxysettings{'THROTTLING_GREEN_TOTAL'} = 'unlimited';}
281 if ($proxysettings{'THROTTLING_GREEN_HOST'} eq 0) {$proxysettings{'THROTTLING_GREEN_HOST'} = 'unlimited';}
282 if ($proxysettings{'THROTTLING_BLUE_TOTAL'} eq 0) {$proxysettings{'THROTTLING_BLUE_TOTAL'} = 'unlimited';}
283 if ($proxysettings{'THROTTLING_BLUE_HOST'} eq 0) {$proxysettings{'THROTTLING_BLUE_HOST'} = 'unlimited';}
284
285 if ($proxysettings{'ACTION'} eq $Lang::tr{'advproxy NCSA user management'})
286 {
287 $proxysettings{'NCSA_EDIT_MODE'} = 'yes';
288 }
289
290 if ($proxysettings{'ACTION'} eq $Lang::tr{'add'})
291 {
292 $proxysettings{'NCSA_EDIT_MODE'} = 'yes';
293 if (length($proxysettings{'NCSA_PASS'}) < $proxysettings{'NCSA_MIN_PASS_LEN'}) {
294 $errormessage = $Lang::tr{'advproxy errmsg password length 1'}.$proxysettings{'NCSA_MIN_PASS_LEN'}.$Lang::tr{'advproxy errmsg password length 2'};
295 }
296 if (!($proxysettings{'NCSA_PASS'} eq $proxysettings{'NCSA_PASS_CONFIRM'})) {
297 $errormessage = $Lang::tr{'advproxy errmsg passwords different'};
298 }
299 if ($proxysettings{'NCSA_USERNAME'} eq '') {
300 $errormessage = $Lang::tr{'advproxy errmsg no username'};
301 }
302 if (!$errormessage) {
303 $proxysettings{'NCSA_USERNAME'} =~ tr/A-Z/a-z/;
304 &adduser($proxysettings{'NCSA_USERNAME'}, $proxysettings{'NCSA_PASS'}, $proxysettings{'NCSA_GROUP'});
305 }
306 $proxysettings{'NCSA_USERNAME'} = '';
307 $proxysettings{'NCSA_GROUP'} = '';
308 $proxysettings{'NCSA_PASS'} = '';
309 $proxysettings{'NCSA_PASS_CONFIRM'} = '';
310 }
311
312 if ($proxysettings{'ACTION'} eq $Lang::tr{'remove'})
313 {
314 $proxysettings{'NCSA_EDIT_MODE'} = 'yes';
315 &deluser($proxysettings{'ID'});
316 }
317
318 $checked{'ENABLE_UPDXLRATOR'}{'off'} = '';
319 $checked{'ENABLE_UPDXLRATOR'}{'on'} = '';
320 $checked{'ENABLE_UPDXLRATOR'}{$proxysettings{'ENABLE_UPDXLRATOR'}} = "checked='checked'";
321
322 if ($proxysettings{'ACTION'} eq $Lang::tr{'edit'})
323 {
324 $proxysettings{'NCSA_EDIT_MODE'} = 'yes';
325 $ncsa_buttontext = $Lang::tr{'advproxy NCSA update user'};
326 @temp = split(/:/,$proxysettings{'ID'});
327 $proxysettings{'NCSA_USERNAME'} = $temp[0];
328 $proxysettings{'NCSA_GROUP'} = $temp[1];
329 $proxysettings{'NCSA_PASS'} = "lEaVeAlOnE";
330 $proxysettings{'NCSA_PASS_CONFIRM'} = $proxysettings{'NCSA_PASS'};
331 }
332
333 if (($proxysettings{'ACTION'} eq $Lang::tr{'save'}) || ($proxysettings{'ACTION'} eq $Lang::tr{'advproxy save and restart'}) || ($proxysettings{'ACTION'} eq $Lang::tr{'proxy reconfigure'}))
334 {
335 if ($proxysettings{'ENABLE'} !~ /^(on|off)$/ ||
336 $proxysettings{'TRANSPARENT'} !~ /^(on|off)$/ ||
337 $proxysettings{'ENABLE_BLUE'} !~ /^(on|off)$/ ||
338 $proxysettings{'TRANSPARENT_BLUE'} !~ /^(on|off)$/ ) {
339 $errormessage = $Lang::tr{'invalid input'};
340 goto ERROR;
341 }
342 if($proxysettings{'CACHE_MEM'} > $proxysettings{'CACHE_SIZE'} && $proxysettings{'CACHE_SIZE'} > 0){
343 $errormessage = $Lang::tr{'advproxy errmsg cache'}." ".$proxysettings{'CACHE_MEM'}." > ".$proxysettings{'CACHE_SIZE'};
344 goto ERROR;
345 }
346
347 if (!(&General::validport($proxysettings{'PROXY_PORT'})))
348 {
349 $errormessage = $Lang::tr{'advproxy errmsg invalid proxy port'};
350 goto ERROR;
351 }
352 if (!(&General::validport($proxysettings{'TRANSPARENT_PORT'})))
353 {
354 $errormessage = $Lang::tr{'advproxy errmsg invalid proxy port'};
355 goto ERROR;
356 }
357 if ($proxysettings{'PROXY_PORT'} eq $proxysettings{'TRANSPARENT_PORT'}) {
358 $errormessage = $Lang::tr{'advproxy errmsg proxy ports equal'};
359 goto ERROR;
360 }
361 if (!($proxysettings{'UPSTREAM_PROXY'} eq ''))
362 {
363 my @temp = split(/:/,$proxysettings{'UPSTREAM_PROXY'});
364 if (!(&General::validip($temp[0])))
365 {
366 if (!(&General::validdomainname($temp[0])))
367 {
368 $errormessage = $Lang::tr{'advproxy errmsg invalid upstream proxy'};
369 goto ERROR;
370 }
371 }
372 }
373 if (!($proxysettings{'CACHE_SIZE'} =~ /^\d+/) ||
374 ($proxysettings{'CACHE_SIZE'} < 10))
375 {
376 if (!($proxysettings{'CACHE_SIZE'} eq '0'))
377 {
378 $errormessage = $Lang::tr{'advproxy errmsg hdd cache size'};
379 goto ERROR;
380 }
381 }
382 if (!($proxysettings{'FILEDESCRIPTORS'} =~ /^\d+/) ||
383 ($proxysettings{'FILEDESCRIPTORS'} < 1) || ($proxysettings{'FILEDESCRIPTORS'} > 1048576))
384 {
385 $errormessage = $Lang::tr{'proxy errmsg filedescriptors'};
386 goto ERROR;
387 }
388 if (!($proxysettings{'CACHE_MEM'} =~ /^\d+/))
389 {
390 $errormessage = $Lang::tr{'advproxy errmsg mem cache size'};
391 goto ERROR;
392 }
393 my @free = &General::system_output("/usr/bin/free");
394 $free[1] =~ m/(\d+)/;
395 $cachemem = int $1 / 2048;
396 if ($proxysettings{'CACHE_MEM'} > $cachemem) {
397 $proxysettings{'CACHE_MEM'} = $cachemem;
398 }
399 if (!($proxysettings{'MAX_SIZE'} =~ /^\d+/))
400 {
401 $errormessage = $Lang::tr{'invalid maximum object size'};
402 goto ERROR;
403 }
404 if (!($proxysettings{'MIN_SIZE'} =~ /^\d+/))
405 {
406 $errormessage = $Lang::tr{'invalid minimum object size'};
407 goto ERROR;
408 }
409 if (!($proxysettings{'MAX_OUTGOING_SIZE'} =~ /^\d+/))
410 {
411 $errormessage = $Lang::tr{'invalid maximum outgoing size'};
412 goto ERROR;
413 }
414 if (!($proxysettings{'TIME_TO_HOUR'}.$proxysettings{'TIME_TO_MINUTE'} gt $proxysettings{'TIME_FROM_HOUR'}.$proxysettings{'TIME_FROM_MINUTE'}))
415 {
416 $errormessage = $Lang::tr{'advproxy errmsg time restriction'};
417 goto ERROR;
418 }
419 if (!($proxysettings{'MAX_INCOMING_SIZE'} =~ /^\d+/))
420 {
421 $errormessage = $Lang::tr{'invalid maximum incoming size'};
422 goto ERROR;
423 }
424 if (($proxysettings{'ASNBL_FASTFLUX_DETECTION'} eq 'on') || ($proxysettings{'ASNBL_SELECANN_DETECTION'} eq 'on'))
425 {
426 if (-z $proxysettings{'ASNBL_FASTFLUX_THRESHOLD'}) {
427 $errormessage = $Lang::tr{'advproxy fastflux no threshold given'};
428 goto ERROR;
429 }
430 if (! looks_like_number($proxysettings{'ASNBL_FASTFLUX_THRESHOLD'})) {
431 $errormessage = $Lang::tr{'advproxy fastflux threshold invalid'};
432 goto ERROR;
433 }
434 if (($proxysettings{'ASNBL_FASTFLUX_THRESHOLD'} < 2) || ($proxysettings{'ASNBL_FASTFLUX_THRESHOLD'} > 10)) {
435 $errormessage = $Lang::tr{'advproxy fastflux threshold out of bounds'};
436 goto ERROR;
437 }
438 }
439 if (!($proxysettings{'AUTH_METHOD'} eq 'none'))
440 {
441 unless (($proxysettings{'AUTH_METHOD'} eq 'ident') &&
442 ($proxysettings{'IDENT_REQUIRED'} eq 'off') &&
443 ($proxysettings{'IDENT_ENABLE_ACL'} eq 'off'))
444 {
445 if ($netsettings{'BLUE_DEV'})
446 {
447 if ((($proxysettings{'ENABLE'} eq 'off') || ($proxysettings{'TRANSPARENT'} eq 'on')) &&
448 (($proxysettings{'ENABLE_BLUE'} eq 'off') || ($proxysettings{'TRANSPARENT_BLUE'} eq 'on')))
449 {
450 $errormessage = $Lang::tr{'advproxy errmsg non-transparent proxy required'};
451 goto ERROR;
452 }
453 } else {
454 if (($proxysettings{'ENABLE'} eq 'off') || ($proxysettings{'TRANSPARENT'} eq 'on'))
455 {
456 $errormessage = $Lang::tr{'advproxy errmsg non-transparent proxy required'};
457 goto ERROR;
458 }
459 }
460 }
461 if ((!($proxysettings{'AUTH_MAX_USERIP'} eq '')) &&
462 ((!($proxysettings{'AUTH_MAX_USERIP'} =~ /^\d+/)) || ($proxysettings{'AUTH_MAX_USERIP'} < 1) || ($proxysettings{'AUTH_MAX_USERIP'} > 255)))
463 {
464 $errormessage = $Lang::tr{'advproxy errmsg max userip'};
465 goto ERROR;
466 }
467 if (!($proxysettings{'AUTH_CACHE_TTL'} =~ /^\d+/))
468 {
469 $errormessage = $Lang::tr{'advproxy errmsg auth cache ttl'};
470 goto ERROR;
471 }
472 if (!($proxysettings{'AUTH_IPCACHE_TTL'} =~ /^\d+/))
473 {
474 $errormessage = $Lang::tr{'advproxy errmsg auth ipcache ttl'};
475 goto ERROR;
476 }
477 if ((!($proxysettings{'AUTH_MAX_USERIP'} eq '')) && ($proxysettings{'AUTH_IPCACHE_TTL'} eq '0'))
478 {
479 $errormessage = $Lang::tr{'advproxy errmsg auth ipcache may not be null'};
480 goto ERROR;
481 }
482 if ((!($proxysettings{'AUTH_CHILDREN'} =~ /^\d+/)) || ($proxysettings{'AUTH_CHILDREN'} < 1) || ($proxysettings{'AUTH_CHILDREN'} > 255))
483 {
484 $errormessage = $Lang::tr{'advproxy errmsg auth children'};
485 goto ERROR;
486 }
487 }
488 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
489 {
490 if ((!($proxysettings{'NCSA_MIN_PASS_LEN'} =~ /^\d+/)) || ($proxysettings{'NCSA_MIN_PASS_LEN'} < 1) || ($proxysettings{'NCSA_MIN_PASS_LEN'} > 255))
491 {
492 $errormessage = $Lang::tr{'advproxy errmsg password length'};
493 goto ERROR;
494 }
495 }
496 if ($proxysettings{'AUTH_METHOD'} eq 'ident')
497 {
498 if ((!($proxysettings{'IDENT_TIMEOUT'} =~ /^\d+/)) || ($proxysettings{'IDENT_TIMEOUT'} < 1))
499 {
500 $errormessage = $Lang::tr{'advproxy errmsg ident timeout'};
501 goto ERROR;
502 }
503 }
504 if ($proxysettings{'AUTH_METHOD'} eq 'ldap')
505 {
506 if ($proxysettings{'LDAP_BASEDN'} eq '')
507 {
508 $errormessage = $Lang::tr{'advproxy errmsg ldap base dn'};
509 goto ERROR;
510 }
511 if (!&General::validip($proxysettings{'LDAP_SERVER'}))
512 {
513 if (!&General::validdomainname($proxysettings{'LDAP_SERVER'}))
514 {
515 $errormessage = $Lang::tr{'advproxy errmsg ldap server'};
516 goto ERROR;
517 }
518 }
519 if (!&General::validport($proxysettings{'LDAP_PORT'}))
520 {
521 $errormessage = $Lang::tr{'advproxy errmsg ldap port'};
522 goto ERROR;
523 }
524 if (($proxysettings{'LDAP_TYPE'} eq 'ADS') || ($proxysettings{'LDAP_TYPE'} eq 'NDS'))
525 {
526 if (($proxysettings{'LDAP_BINDDN_USER'} eq '') || ($proxysettings{'LDAP_BINDDN_PASS'} eq ''))
527 {
528 $errormessage = $Lang::tr{'advproxy errmsg ldap bind dn'};
529 goto ERROR;
530 }
531 }
532 }
533 if ($proxysettings{'AUTH_METHOD'} eq 'radius')
534 {
535 if (!&General::validip($proxysettings{'RADIUS_SERVER'}))
536 {
537 $errormessage = $Lang::tr{'advproxy errmsg radius server'};
538 goto ERROR;
539 }
540 if (!&General::validport($proxysettings{'RADIUS_PORT'}))
541 {
542 $errormessage = $Lang::tr{'advproxy errmsg radius port'};
543 goto ERROR;
544 }
545 if ($proxysettings{'RADIUS_SECRET'} eq '')
546 {
547 $errormessage = $Lang::tr{'advproxy errmsg radius secret'};
548 goto ERROR;
549 }
550 }
551
552 # Quick parent proxy error checking of username and password info. If username password don't both exist give an error.
553 $proxy1 = 'YES';
554 $proxy2 = 'YES';
555 if (($proxysettings{'UPSTREAM_USER'} eq '')) {$proxy1 = '';}
556 if (($proxysettings{'UPSTREAM_PASSWORD'} eq '')) {$proxy2 = '';}
557 if ($proxysettings{'UPSTREAM_USER'} eq 'PASS') {$proxy1=$proxy2='PASS'; $proxysettings{'UPSTREAM_PASSWORD'} = '';}
558 if (($proxy1 ne $proxy2))
559 {
560 $errormessage = $Lang::tr{'advproxy errmsg invalid upstream proxy username or password setting'};
561 goto ERROR;
562 }
563
564 ERROR:
565 &check_acls;
566
567 if ($errormessage) {
568 $proxysettings{'VALID'} = 'no'; }
569 else {
570 $proxysettings{'VALID'} = 'yes'; }
571
572 if ($proxysettings{'VALID'} eq 'yes')
573 {
574 # Determine if suricata may needs to be restarted.
575 my $suricata_proxy_ports_changed;
576
577 # Check if the IDS is running
578 if(&IDS::ids_is_running()) {
579 my %oldproxysettings;
580
581 # Read-in current proxy settings and store them as oldsettings hash.
582 &General::readhash("${General::swroot}/proxy/advanced/settings", \%oldproxysettings);
583
584 # Check if the proxy port has been changed.
585 unless ($proxysettings{'PROXY_PORT'} eq $oldproxysettings{'PROXY_PORT'}) {
586 # Port has changed, suricata needs to be adjusted.
587 $suricata_proxy_ports_changed = 1;
588 }
589
590 # Check if the transparent port has been changed.
591 unless ($proxysettings{'TRANSPARENT_PORT'} eq $oldproxysettings{'TRANSPARENT_PORT'}) {
592 # Transparent port has changed, suricata needs to be adjusted.
593 $suricata_proxy_ports_changed = 1;
594 }
595 }
596
597 &write_acls;
598
599 delete $proxysettings{'SRC_SUBNETS'};
600 delete $proxysettings{'SRC_BANNED_IP'};
601 delete $proxysettings{'SRC_BANNED_MAC'};
602 delete $proxysettings{'SRC_UNRESTRICTED_IP'};
603 delete $proxysettings{'SRC_UNRESTRICTED_MAC'};
604 delete $proxysettings{'DST_NOCACHE'};
605 delete $proxysettings{'DST_NOAUTH'};
606 delete $proxysettings{'DST_NOPROXY_IP'};
607 delete $proxysettings{'DST_NOPROXY_URL'};
608 delete $proxysettings{'PORTS_SAFE'};
609 delete $proxysettings{'PORTS_SSL'};
610 delete $proxysettings{'MIME_TYPES'};
611 delete $proxysettings{'NTLM_ALLOW_USERS'};
612 delete $proxysettings{'NTLM_DENY_USERS'};
613 delete $proxysettings{'RADIUS_ALLOW_USERS'};
614 delete $proxysettings{'RADIUS_DENY_USERS'};
615 delete $proxysettings{'IDENT_HOSTS'};
616 delete $proxysettings{'IDENT_ALLOW_USERS'};
617 delete $proxysettings{'IDENT_DENY_USERS'};
618
619 delete $proxysettings{'CRE_GROUPS'};
620 delete $proxysettings{'CRE_SVHOSTS'};
621
622 delete $proxysettings{'NCSA_USERNAME'};
623 delete $proxysettings{'NCSA_GROUP'};
624 delete $proxysettings{'NCSA_PASS'};
625 delete $proxysettings{'NCSA_PASS_CONFIRM'};
626
627 $proxysettings{'TIME_MON'} = 'off' unless exists $proxysettings{'TIME_MON'};
628 $proxysettings{'TIME_TUE'} = 'off' unless exists $proxysettings{'TIME_TUE'};
629 $proxysettings{'TIME_WED'} = 'off' unless exists $proxysettings{'TIME_WED'};
630 $proxysettings{'TIME_THU'} = 'off' unless exists $proxysettings{'TIME_THU'};
631 $proxysettings{'TIME_FRI'} = 'off' unless exists $proxysettings{'TIME_FRI'};
632 $proxysettings{'TIME_SAT'} = 'off' unless exists $proxysettings{'TIME_SAT'};
633 $proxysettings{'TIME_SUN'} = 'off' unless exists $proxysettings{'TIME_SUN'};
634
635 $proxysettings{'AUTH_ALWAYS_REQUIRED'} = 'off' unless exists $proxysettings{'AUTH_ALWAYS_REQUIRED'};
636 $proxysettings{'NTLM_ENABLE_INT_AUTH'} = 'off' unless exists $proxysettings{'NTLM_ENABLE_INT_AUTH'};
637
638 &General::writehash("${General::swroot}/proxy/advanced/settings", \%proxysettings);
639
640 if (-e "${General::swroot}/proxy/settings") { &General::readhash("${General::swroot}/proxy/settings", \%stdproxysettings); }
641 $stdproxysettings{'PROXY_PORT'} = $proxysettings{'PROXY_PORT'};
642 $stdproxysettings{'UPSTREAM_PROXY'} = $proxysettings{'UPSTREAM_PROXY'};
643 $stdproxysettings{'UPSTREAM_USER'} = $proxysettings{'UPSTREAM_USER'};
644 $stdproxysettings{'UPSTREAM_PASSWORD'} = $proxysettings{'UPSTREAM_PASSWORD'};
645 $stdproxysettings{'ENABLE_FILTER'} = $proxysettings{'ENABLE_FILTER'};
646 $stdproxysettings{'ENABLE_UPDXLRATOR'} = $proxysettings{'ENABLE_UPDXLRATOR'};
647 $stdproxysettings{'ENABLE_CLAMAV'} = $proxysettings{'ENABLE_CLAMAV'};
648 &General::writehash("${General::swroot}/proxy/settings", \%stdproxysettings);
649
650 &writeconfig;
651 &writepacfile;
652
653 if ($proxysettings{'CACHEMGR'} eq 'on'){&writecachemgr;}
654
655 &General::system ('/usr/local/bin/squidctrl', 'disable');
656 unlink "${General::swroot}/proxy/enable";
657 unlink "${General::swroot}/proxy/transparent";
658 unlink "${General::swroot}/proxy/enable_blue";
659 unlink "${General::swroot}/proxy/transparent_blue";
660
661 if ($proxysettings{'ENABLE'} eq 'on') {
662 &General::system('/usr/bin/touch', "${General::swroot}/proxy/enable");
663 &General::system('/usr/local/bin/squidctrl', 'enable'); }
664 if ($proxysettings{'TRANSPARENT'} eq 'on' && $proxysettings{'ENABLE'} eq 'on') {
665 &General::system('/usr/bin/touch', "${General::swroot}/proxy/transparent"); }
666 if ($proxysettings{'ENABLE_BLUE'} eq 'on') {
667 &General::system('/usr/bin/touch', "${General::swroot}/proxy/enable_blue");
668 &General::system('/usr/local/bin/squidctrl', 'enable'); }
669 if ($proxysettings{'TRANSPARENT_BLUE'} eq 'on' && $proxysettings{'ENABLE_BLUE'} eq 'on') {
670 &General::system('/usr/bin/touch', "${General::swroot}/proxy/transparent_blue"); }
671
672 if ($proxysettings{'ACTION'} eq $Lang::tr{'advproxy save and restart'}) { &General::system('/usr/local/bin/squidctrl', 'restart'); }
673 if ($proxysettings{'ACTION'} eq $Lang::tr{'proxy reconfigure'}) { &General::system('/usr/local/bin/squidctrl', 'reconfigure'); }
674
675 # Check if the suricata_proxy_ports_changed flag has been set.
676 if ($suricata_proxy_ports_changed) {
677 # Re-generate HTTP ports file.
678 &IDS::generate_http_ports_file();
679
680 # Restart suricata.
681 &IDS::call_suricatactrl("restart");
682 }
683 }
684 }
685
686 if ($proxysettings{'ACTION'} eq $Lang::tr{'advproxy clear cache'})
687 {
688 &General::system('/usr/local/bin/squidctrl', 'flush');
689 }
690
691 if (!$errormessage)
692 {
693 if (-e "${General::swroot}/proxy/advanced/settings") {
694 &General::readhash("${General::swroot}/proxy/advanced/settings", \%proxysettings);
695 } elsif (-e "${General::swroot}/proxy/settings") {
696 &General::readhash("${General::swroot}/proxy/settings", \%proxysettings);
697 }
698 &read_acls;
699 }
700
701 # ------------------------------------------------------------------
702
703 # Hook to regenerate the configuration files, if cgi got called from command line.
704 if ($ENV{"REMOTE_ADDR"} eq "") {
705 writeconfig();
706 exit(0);
707 }
708
709 # -------------------------------------------------------------------
710
711 $checked{'ENABLE'}{'off'} = '';
712 $checked{'ENABLE'}{'on'} = '';
713 $checked{'ENABLE'}{$proxysettings{'ENABLE'}} = "checked='checked'";
714
715 $checked{'TRANSPARENT'}{'off'} = '';
716 $checked{'TRANSPARENT'}{'on'} = '';
717 $checked{'TRANSPARENT'}{$proxysettings{'TRANSPARENT'}} = "checked='checked'";
718
719 $checked{'ENABLE_BLUE'}{'off'} = '';
720 $checked{'ENABLE_BLUE'}{'on'} = '';
721 $checked{'ENABLE_BLUE'}{$proxysettings{'ENABLE_BLUE'}} = "checked='checked'";
722
723 $checked{'TRANSPARENT_BLUE'}{'off'} = '';
724 $checked{'TRANSPARENT_BLUE'}{'on'} = '';
725 $checked{'TRANSPARENT_BLUE'}{$proxysettings{'TRANSPARENT_BLUE'}} = "checked='checked'";
726
727 $checked{'FORWARD_IPADDRESS'}{'off'} = '';
728 $checked{'FORWARD_IPADDRESS'}{'on'} = '';
729 $checked{'FORWARD_IPADDRESS'}{$proxysettings{'FORWARD_IPADDRESS'}} = "checked='checked'";
730 $checked{'FORWARD_USERNAME'}{'off'} = '';
731 $checked{'FORWARD_USERNAME'}{'on'} = '';
732 $checked{'FORWARD_USERNAME'}{$proxysettings{'FORWARD_USERNAME'}} = "checked='checked'";
733 $checked{'FORWARD_VIA'}{'off'} = '';
734 $checked{'FORWARD_VIA'}{'on'} = '';
735 $checked{'FORWARD_VIA'}{$proxysettings{'FORWARD_VIA'}} = "checked='checked'";
736 $checked{'NO_CONNECTION_AUTH'}{'off'} = '';
737 $checked{'NO_CONNECTION_AUTH'}{'on'} = '';
738 $checked{'NO_CONNECTION_AUTH'}{$proxysettings{'NO_CONNECTION_AUTH'}} = "checked='checked'";
739
740 $selected{'MEM_POLICY'}{$proxysettings{'MEM_POLICY'}} = "selected='selected'";
741 $selected{'CACHE_POLICY'}{$proxysettings{'CACHE_POLICY'}} = "selected='selected'";
742 $selected{'L1_DIRS'}{$proxysettings{'L1_DIRS'}} = "selected='selected'";
743 $checked{'OFFLINE_MODE'}{'off'} = '';
744 $checked{'OFFLINE_MODE'}{'on'} = '';
745 $checked{'OFFLINE_MODE'}{$proxysettings{'OFFLINE_MODE'}} = "checked='checked'";
746 $checked{'CACHE_DIGESTS'}{'off'} = '';
747 $checked{'CACHE_DIGESTS'}{'on'} = '';
748 $checked{'CACHE_DIGESTS'}{$proxysettings{'CACHE_DIGESTS'}} = "checked='checked'";
749
750 $checked{'LOGGING'}{'off'} = '';
751 $checked{'LOGGING'}{'on'} = '';
752 $checked{'LOGGING'}{$proxysettings{'LOGGING'}} = "checked='checked'";
753 $checked{'CACHEMGR'}{'off'} = '';
754 $checked{'CACHEMGR'}{'on'} = '';
755 $checked{'CACHEMGR'}{$proxysettings{'CACHEMGR'}} = "checked='checked'";
756 $checked{'LOGQUERY'}{'off'} = '';
757 $checked{'LOGQUERY'}{'on'} = '';
758 $checked{'LOGQUERY'}{$proxysettings{'LOGQUERY'}} = "checked='checked'";
759 $checked{'LOGUSERAGENT'}{'off'} = '';
760 $checked{'LOGUSERAGENT'}{'on'} = '';
761 $checked{'LOGUSERAGENT'}{$proxysettings{'LOGUSERAGENT'}} = "checked='checked'";
762
763 $selected{'ERR_LANGUAGE'}{$proxysettings{'ERR_LANGUAGE'}} = "selected='selected'";
764 $selected{'ERR_DESIGN'}{$proxysettings{'ERR_DESIGN'}} = "selected='selected'";
765
766 $checked{'NO_PROXY_LOCAL'}{'off'} = '';
767 $checked{'NO_PROXY_LOCAL'}{'on'} = '';
768 $checked{'NO_PROXY_LOCAL'}{$proxysettings{'NO_PROXY_LOCAL'}} = "checked='checked'";
769 $checked{'NO_PROXY_LOCAL_BLUE'}{'off'} = '';
770 $checked{'NO_PROXY_LOCAL_BLUE'}{'on'} = '';
771 $checked{'NO_PROXY_LOCAL_BLUE'}{$proxysettings{'NO_PROXY_LOCAL_BLUE'}} = "checked='checked'";
772
773 $checked{'CLASSROOM_EXT'}{'off'} = '';
774 $checked{'CLASSROOM_EXT'}{'on'} = '';
775 $checked{'CLASSROOM_EXT'}{$proxysettings{'CLASSROOM_EXT'}} = "checked='checked'";
776
777 $selected{'TIME_ACCESS_MODE'}{$proxysettings{'TIME_ACCESS_MODE'}} = "selected='selected'";
778 $selected{'TIME_FROM_HOUR'}{$proxysettings{'TIME_FROM_HOUR'}} = "selected='selected'";
779 $selected{'TIME_FROM_MINUTE'}{$proxysettings{'TIME_FROM_MINUTE'}} = "selected='selected'";
780 $selected{'TIME_TO_HOUR'}{$proxysettings{'TIME_TO_HOUR'}} = "selected='selected'";
781 $selected{'TIME_TO_MINUTE'}{$proxysettings{'TIME_TO_MINUTE'}} = "selected='selected'";
782
783 $proxysettings{'TIME_MON'} = 'on' unless exists $proxysettings{'TIME_MON'};
784 $proxysettings{'TIME_TUE'} = 'on' unless exists $proxysettings{'TIME_TUE'};
785 $proxysettings{'TIME_WED'} = 'on' unless exists $proxysettings{'TIME_WED'};
786 $proxysettings{'TIME_THU'} = 'on' unless exists $proxysettings{'TIME_THU'};
787 $proxysettings{'TIME_FRI'} = 'on' unless exists $proxysettings{'TIME_FRI'};
788 $proxysettings{'TIME_SAT'} = 'on' unless exists $proxysettings{'TIME_SAT'};
789 $proxysettings{'TIME_SUN'} = 'on' unless exists $proxysettings{'TIME_SUN'};
790
791 $checked{'TIME_MON'}{'off'} = '';
792 $checked{'TIME_MON'}{'on'} = '';
793 $checked{'TIME_MON'}{$proxysettings{'TIME_MON'}} = "checked='checked'";
794 $checked{'TIME_TUE'}{'off'} = '';
795 $checked{'TIME_TUE'}{'on'} = '';
796 $checked{'TIME_TUE'}{$proxysettings{'TIME_TUE'}} = "checked='checked'";
797 $checked{'TIME_WED'}{'off'} = '';
798 $checked{'TIME_WED'}{'on'} = '';
799 $checked{'TIME_WED'}{$proxysettings{'TIME_WED'}} = "checked='checked'";
800 $checked{'TIME_THU'}{'off'} = '';
801 $checked{'TIME_THU'}{'on'} = '';
802 $checked{'TIME_THU'}{$proxysettings{'TIME_THU'}} = "checked='checked'";
803 $checked{'TIME_FRI'}{'off'} = '';
804 $checked{'TIME_FRI'}{'on'} = '';
805 $checked{'TIME_FRI'}{$proxysettings{'TIME_FRI'}} = "checked='checked'";
806 $checked{'TIME_SAT'}{'off'} = '';
807 $checked{'TIME_SAT'}{'on'} = '';
808 $checked{'TIME_SAT'}{$proxysettings{'TIME_SAT'}} = "checked='checked'";
809 $checked{'TIME_SUN'}{'off'} = '';
810 $checked{'TIME_SUN'}{'on'} = '';
811 $checked{'TIME_SUN'}{$proxysettings{'TIME_SUN'}} = "checked='checked'";
812
813 $selected{'THROTTLING_GREEN_TOTAL'}{$proxysettings{'THROTTLING_GREEN_TOTAL'}} = "selected='selected'";
814 $selected{'THROTTLING_GREEN_HOST'}{$proxysettings{'THROTTLING_GREEN_HOST'}} = "selected='selected'";
815 $selected{'THROTTLING_BLUE_TOTAL'}{$proxysettings{'THROTTLING_BLUE_TOTAL'}} = "selected='selected'";
816 $selected{'THROTTLING_BLUE_HOST'}{$proxysettings{'THROTTLING_BLUE_HOST'}} = "selected='selected'";
817
818 $checked{'ASNBL_FASTFLUX_DETECTION'}{'off'} = '';
819 $checked{'ASNBL_FASTFLUX_DETECTION'}{'on'} = '';
820 $checked{'ASNBL_FASTFLUX_DETECTION'}{$proxysettings{'ASNBL_FASTFLUX_DETECTION'}} = "checked='checked'";
821
822 $checked{'ASNBL_SELECANN_DETECTION'}{'off'} = '';
823 $checked{'ASNBL_SELECANN_DETECTION'}{'on'} = '';
824 $checked{'ASNBL_SELECANN_DETECTION'}{$proxysettings{'ASNBL_SELECANN_DETECTION'}} = "checked='checked'";
825
826 $checked{'ENABLE_MIME_FILTER'}{'off'} = '';
827 $checked{'ENABLE_MIME_FILTER'}{'on'} = '';
828 $checked{'ENABLE_MIME_FILTER'}{$proxysettings{'ENABLE_MIME_FILTER'}} = "checked='checked'";
829
830 $checked{'AUTH_METHOD'}{'none'} = '';
831 $checked{'AUTH_METHOD'}{'ncsa'} = '';
832 $checked{'AUTH_METHOD'}{'ident'} = '';
833 $checked{'AUTH_METHOD'}{'ldap'} = '';
834 $checked{'AUTH_METHOD'}{'ntlm-auth'} = '';
835 $checked{'AUTH_METHOD'}{'radius'} = '';
836 $checked{'AUTH_METHOD'}{$proxysettings{'AUTH_METHOD'}} = "checked='checked'";
837
838 $proxysettings{'AUTH_ALWAYS_REQUIRED'} = 'on' unless exists $proxysettings{'AUTH_ALWAYS_REQUIRED'};
839
840 $checked{'AUTH_ALWAYS_REQUIRED'}{'off'} = '';
841 $checked{'AUTH_ALWAYS_REQUIRED'}{'on'} = '';
842 $checked{'AUTH_ALWAYS_REQUIRED'}{$proxysettings{'AUTH_ALWAYS_REQUIRED'}} = "checked='checked'";
843
844 $checked{'NCSA_BYPASS_REDIR'}{'off'} = '';
845 $checked{'NCSA_BYPASS_REDIR'}{'on'} = '';
846 $checked{'NCSA_BYPASS_REDIR'}{$proxysettings{'NCSA_BYPASS_REDIR'}} = "checked='checked'";
847
848 $selected{'NCSA_GROUP'}{$proxysettings{'NCSA_GROUP'}} = "selected='selected'";
849
850 $selected{'LDAP_TYPE'}{$proxysettings{'LDAP_TYPE'}} = "selected='selected'";
851
852 $proxysettings{'NTLM_ENABLE_INT_AUTH'} = 'on' unless exists $proxysettings{'NTLM_ENABLE_INT_AUTH'};
853
854 $checked{'NTLM_ENABLE_INT_AUTH'}{'off'} = '';
855 $checked{'NTLM_ENABLE_INT_AUTH'}{'on'} = '';
856 $checked{'NTLM_ENABLE_INT_AUTH'}{$proxysettings{'NTLM_ENABLE_INT_AUTH'}} = "checked='checked'";
857
858 $checked{'NTLM_ENABLE_ACL'}{'off'} = '';
859 $checked{'NTLM_ENABLE_ACL'}{'on'} = '';
860 $checked{'NTLM_ENABLE_ACL'}{$proxysettings{'NTLM_ENABLE_ACL'}} = "checked='checked'";
861
862 $checked{'NTLM_USER_ACL'}{'positive'} = '';
863 $checked{'NTLM_USER_ACL'}{'negative'} = '';
864 $checked{'NTLM_USER_ACL'}{$proxysettings{'NTLM_USER_ACL'}} = "checked='checked'";
865
866 $checked{'NTLM_AUTH_BASIC'}{'on'} = '';
867 $checked{'NTLM_AUTH_BASIC'}{'off'} = '';
868 $checked{'NTLM_AUTH_BASIC'}{$proxysettings{'NTLM_AUTH_BASIC'}} = "checked='checked'";
869
870 $checked{'RADIUS_ENABLE_ACL'}{'off'} = '';
871 $checked{'RADIUS_ENABLE_ACL'}{'on'} = '';
872 $checked{'RADIUS_ENABLE_ACL'}{$proxysettings{'RADIUS_ENABLE_ACL'}} = "checked='checked'";
873
874 $checked{'RADIUS_USER_ACL'}{'positive'} = '';
875 $checked{'RADIUS_USER_ACL'}{'negative'} = '';
876 $checked{'RADIUS_USER_ACL'}{$proxysettings{'RADIUS_USER_ACL'}} = "checked='checked'";
877
878 $checked{'IDENT_REQUIRED'}{'off'} = '';
879 $checked{'IDENT_REQUIRED'}{'on'} = '';
880 $checked{'IDENT_REQUIRED'}{$proxysettings{'IDENT_REQUIRED'}} = "checked='checked'";
881
882 $checked{'IDENT_ENABLE_ACL'}{'off'} = '';
883 $checked{'IDENT_ENABLE_ACL'}{'on'} = '';
884 $checked{'IDENT_ENABLE_ACL'}{$proxysettings{'IDENT_ENABLE_ACL'}} = "checked='checked'";
885
886 $checked{'IDENT_USER_ACL'}{'positive'} = '';
887 $checked{'IDENT_USER_ACL'}{'negative'} = '';
888 $checked{'IDENT_USER_ACL'}{$proxysettings{'IDENT_USER_ACL'}} = "checked='checked'";
889
890 $checked{'ENABLE_FILTER'}{'off'} = '';
891 $checked{'ENABLE_FILTER'}{'on'} = '';
892 $checked{'ENABLE_FILTER'}{$proxysettings{'ENABLE_FILTER'}} = "checked='checked'";
893
894 $checked{'ENABLE_UPDXLRATOR'}{'off'} = '';
895 $checked{'ENABLE_UPDXLRATOR'}{'on'} = '';
896 $checked{'ENABLE_UPDXLRATOR'}{$proxysettings{'ENABLE_UPDXLRATOR'}} = "checked='checked'";
897
898 $checked{'ENABLE_CLAMAV'}{'off'} = '';
899 $checked{'ENABLE_CLAMAV'}{'on'} = '';
900 $checked{'ENABLE_CLAMAV'}{$proxysettings{'ENABLE_CLAMAV'}} = "checked='checked'";
901
902 &Header::openpage($Lang::tr{'advproxy advanced web proxy configuration'}, 1, '');
903
904 &Header::openbigbox('100%', 'left', '', $errormessage);
905
906 if ($errormessage) {
907 &Header::openbox('100%', 'left', $Lang::tr{'error messages'});
908 print "<font class='base'>$errormessage&nbsp;</font>\n";
909 &Header::closebox();
910 }
911
912 if ($squidversion[0] =~ /^Squid\sCache:\sVersion\s/i)
913 {
914 $squidversion[0] =~ s/^Squid\sCache:\sVersion//i;
915 $squidversion[0] =~ s/^\s+//g;
916 $squidversion[0] =~ s/\s+$//g;
917 } else {
918 $squidversion[0] = $Lang::tr{'advproxy unknown'};
919 }
920
921 # ===================================================================
922 # Main settings
923 # ===================================================================
924
925 unless ($proxysettings{'NCSA_EDIT_MODE'} eq 'yes') {
926
927 print "<form method='post' action='$ENV{'SCRIPT_NAME'}'>\n";
928
929 &Header::openbox('100%', 'left', "$Lang::tr{'advproxy advanced web proxy'}");
930
931 print <<END
932 <table width='100%'>
933 <tr>
934 <td colspan='4' class='base'><b>$Lang::tr{'advproxy common settings'}</b></td>
935 </tr>
936 <tr>
937 <td width='25%' class='base'>$Lang::tr{'advproxy enabled on'} <font color="$Header::colourgreen">Green</font>:</td>
938 <td width='20%'><input type='checkbox' name='ENABLE' $checked{'ENABLE'}{'on'} /></td>
939 <td width='25%' class='base'>$Lang::tr{'advproxy proxy port'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
940 <td width='30%'><input type='text' name='PROXY_PORT' value='$proxysettings{'PROXY_PORT'}' size='5' /></td>
941 </tr>
942 <tr>
943 <td class='base'>$Lang::tr{'advproxy transparent on'} <font color="$Header::colourgreen">Green</font>:</td>
944 <td><input type='checkbox' name='TRANSPARENT' $checked{'TRANSPARENT'}{'on'} /></td>
945 <td width='25%' class='base'>$Lang::tr{'advproxy proxy port transparent'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
946 <td width='30%'><input type='text' name='TRANSPARENT_PORT' value='$proxysettings{'TRANSPARENT_PORT'}' size='5' /></td>
947 </tr>
948 <tr>
949 END
950 ;
951 if ($netsettings{'BLUE_DEV'}) {
952 print "<td class='base'>$Lang::tr{'advproxy enabled on'} <font color='$Header::colourblue'>Blue</font>:</td>";
953 print "<td><input type='checkbox' name='ENABLE_BLUE' $checked{'ENABLE_BLUE'}{'on'} /></td>";
954 } else {
955 print "<td colspan='2'>&nbsp;</td>";
956 }
957 print <<END
958 <td class='base'>$Lang::tr{'advproxy visible hostname'}:</td>
959 <td><input type='text' name='VISIBLE_HOSTNAME' value='$proxysettings{'VISIBLE_HOSTNAME'}' /></td>
960 </tr>
961 <tr>
962 END
963 ;
964 if ($netsettings{'BLUE_DEV'}) {
965 print "<td class='base'>$Lang::tr{'advproxy transparent on'} <font color='$Header::colourblue'>Blue</font>:</td>";
966 print "<td><input type='checkbox' name='TRANSPARENT_BLUE' $checked{'TRANSPARENT_BLUE'}{'on'} /></td>";
967 } else {
968 print "<td colspan='2'>&nbsp;</td>";
969 }
970 print <<END
971 <td class='base'>$Lang::tr{'advproxy error language'}:</td>
972 <td class='base'>
973 <select name='ERR_LANGUAGE'>
974 END
975 ;
976 foreach (<$errordir/*>) {
977 if (-d) {
978 $language = substr($_,rindex($_,"/")+1);
979 print "<option value='$language' $selected{'ERR_LANGUAGE'}{$language}>$language</option>\n";
980 }
981 }
982 print <<END
983 </select>
984 </td>
985 </tr>
986 <tr>
987 <td>&nbsp;</td>
988 <td>&nbsp;</td>
989 <td class='base'>$Lang::tr{'advproxy error design'}:</td>
990 <td class='base'><select name='ERR_DESIGN'>
991 <option value='ipfire' $selected{'ERR_DESIGN'}{'ipfire'}>IPFire</option>
992 <option value='squid' $selected{'ERR_DESIGN'}{'squid'}>$Lang::tr{'advproxy standard'}</option>
993 </select></td>
994 </tr>
995 </table>
996 <hr size='1'>
997 <table width='100%'>
998 END
999 ;
1000 if ( -e "/usr/bin/squidclamav" ) {
1001 print "<td class='base'><b>".$Lang::tr{'advproxy squidclamav'}."</b><br />";
1002 if ( ! -e "/var/run/clamav/clamd.pid" ){
1003 print "<font color='red'>clamav not running</font><br /><br />";
1004 $proxysettings{'ENABLE_CLAMAV'} = 'off';
1005 }
1006 else {
1007 print $Lang::tr{'advproxy enabled'}."<input type='checkbox' name='ENABLE_CLAMAV' ".$checked{'ENABLE_CLAMAV'}{'on'}." /><br />";
1008 }
1009 print "</td>";
1010 } else {
1011 print "<td></td>";
1012 }
1013 print "<td class='base'><a href='/cgi-bin/urlfilter.cgi'><b>".$Lang::tr{'advproxy url filter'}."</a></b><br />";
1014 print $Lang::tr{'advproxy enabled'}."<input type='checkbox' name='ENABLE_FILTER' ".$checked{'ENABLE_FILTER'}{'on'}." /><br />";
1015 print "</td>";
1016 print "<td class='base'><a href='/cgi-bin/updatexlrator.cgi'><b>".$Lang::tr{'advproxy update accelerator'}."</a></b><br />";
1017 print $Lang::tr{'advproxy enabled'}."<input type='checkbox' name='ENABLE_UPDXLRATOR' ".$checked{'ENABLE_UPDXLRATOR'}{'on'}." /><br />";
1018 print "</td></tr>";
1019 print <<END
1020 </table>
1021 <hr size='1'>
1022 <table width='100%'>
1023 <tr>
1024 <td colspan='4' class='base'><b>$Lang::tr{'advproxy upstream proxy'}</b></td>
1025 </tr>
1026 <tr>
1027 <td width='25%' class='base'>$Lang::tr{'advproxy via forwarding'}:</td>
1028 <td width='20%'><input type='checkbox' name='FORWARD_VIA' $checked{'FORWARD_VIA'}{'on'} /></td>
1029 <td width='25%' class='base'>$Lang::tr{'advproxy upstream proxy host:port'}:</td>
1030 <td width='30%'><input type='text' name='UPSTREAM_PROXY' value='$proxysettings{'UPSTREAM_PROXY'}' /></td>
1031 </tr>
1032 <tr>
1033 <td class='base'>$Lang::tr{'advproxy client IP forwarding'}:</td>
1034 <td><input type='checkbox' name='FORWARD_IPADDRESS' $checked{'FORWARD_IPADDRESS'}{'on'} /></td>
1035 <td class='base'>$Lang::tr{'advproxy upstream username'}:</td>
1036 <td><input type='text' name='UPSTREAM_USER' value='$proxysettings{'UPSTREAM_USER'}' /></td>
1037 </tr>
1038 <tr>
1039 <td class='base'>$Lang::tr{'advproxy username forwarding'}:</td>
1040 <td><input type='checkbox' name='FORWARD_USERNAME' $checked{'FORWARD_USERNAME'}{'on'} /></td>
1041 <td class='base'>$Lang::tr{'advproxy upstream password'}:</td>
1042 <td><input type='password' name='UPSTREAM_PASSWORD' value='$proxysettings{'UPSTREAM_PASSWORD'}' /></td>
1043 </tr>
1044 <tr>
1045 <td class='base'>$Lang::tr{'advproxy no connection auth'}:</td>
1046 <td><input type='checkbox' name='NO_CONNECTION_AUTH' $checked{'NO_CONNECTION_AUTH'}{'on'} /></td>
1047 <td>&nbsp;</td>
1048 <td>&nbsp;</td>
1049 </tr>
1050 </table>
1051 <hr size='1'>
1052 <table width='100%'>
1053 <tr>
1054 <td colspan='4' class='base'><b>$Lang::tr{'advproxy log settings'}</b></td>
1055 </tr>
1056 <tr>
1057 <td width='25%' class='base'>$Lang::tr{'advproxy log enabled'}:</td>
1058 <td width='20%'><input type='checkbox' name='LOGGING' $checked{'LOGGING'}{'on'} /></td>
1059 <td width='25%'class='base'>$Lang::tr{'advproxy log query'}:</td>
1060 <td width='30%'><input type='checkbox' name='LOGQUERY' $checked{'LOGQUERY'}{'on'} /></td>
1061 </tr>
1062 <tr>
1063 <td>&nbsp;</td>
1064 <td>&nbsp;</td>
1065 <td class='base'>$Lang::tr{'advproxy log useragent'}:</td>
1066 <td><input type='checkbox' name='LOGUSERAGENT' $checked{'LOGUSERAGENT'}{'on'} /></td>
1067 </tr>
1068 </table>
1069 <hr size='1'>
1070 <table width='100%'>
1071 <tr>
1072 <td colspan='4'><b>$Lang::tr{'advproxy cache management'}</b></td>
1073 </tr>
1074 <tr>
1075 <td class='base'><a href='/cgi-bin/cachemgr.cgi' target='_blank'>$Lang::tr{'proxy cachemgr'}:</td>
1076 <td><input type='checkbox' name='CACHEMGR' $checked{'CACHEMGR'}{'on'} /></td>
1077 <td class='base'>$Lang::tr{'advproxy admin mail'}:</td>
1078 <td><input type='text' name='ADMIN_MAIL_ADDRESS' value='$proxysettings{'ADMIN_MAIL_ADDRESS'}' /></td>
1079 </tr>
1080 <tr>
1081 <td class='base'>$Lang::tr{'proxy filedescriptors'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1082 <td><input type='text' name='FILEDESCRIPTORS' value='$proxysettings{'FILEDESCRIPTORS'}' size='5' /></td>
1083 <td class='base'>$Lang::tr{'proxy admin password'}:</td>
1084 <td><input type='text' name='ADMIN_PASSWORD' value='$proxysettings{'ADMIN_PASSWORD'}' /></td>
1085 </tr>
1086 <tr>
1087 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1088 </tr>
1089 <tr>
1090 <td class='base'>$Lang::tr{'advproxy ram cache size'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1091 <td><input type='text' name='CACHE_MEM' value='$proxysettings{'CACHE_MEM'}' size='5' /></td>
1092 <td class='base'>$Lang::tr{'advproxy hdd cache size'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1093 <td><input type='text' name='CACHE_SIZE' value='$proxysettings{'CACHE_SIZE'}' size='5' /></td>
1094 </tr>
1095 <tr>
1096 <td class='base'>$Lang::tr{'advproxy min size'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1097 <td><input type='text' name='MIN_SIZE' value='$proxysettings{'MIN_SIZE'}' size='5' /></td>
1098 <td class='base'>$Lang::tr{'advproxy max size'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1099 <td><input type='text' name='MAX_SIZE' value='$proxysettings{'MAX_SIZE'}' size='5' /></td>
1100 </tr>
1101 <tr>
1102 <td class='base'>$Lang::tr{'advproxy number of L1 dirs'}:</td>
1103 <td class='base'><select name='L1_DIRS'>
1104 <option value='16' $selected{'L1_DIRS'}{'16'}>16</option>
1105 <option value='32' $selected{'L1_DIRS'}{'32'}>32</option>
1106 <option value='64' $selected{'L1_DIRS'}{'64'}>64</option>
1107 <option value='128' $selected{'L1_DIRS'}{'128'}>128</option>
1108 <option value='256' $selected{'L1_DIRS'}{'256'}>256</option>
1109 </select></td>
1110 <td colspan='2' rowspan= '5' valign='top' class='base'>
1111 <table cellspacing='0' cellpadding='0'>
1112 <tr>
1113 <!-- intentionally left empty -->
1114 </tr>
1115 <tr>
1116 <td>$Lang::tr{'advproxy no cache sites'}:</td>
1117 </tr>
1118 <tr>
1119 <!-- intentionally left empty -->
1120 </tr>
1121 <tr>
1122 <!-- intentionally left empty -->
1123 </tr>
1124 <tr>
1125 <td><textarea name='DST_NOCACHE' cols='32' rows='6' wrap='off'>
1126 END
1127 ;
1128
1129 print $proxysettings{'DST_NOCACHE'};
1130
1131 print <<END
1132 </textarea></td>
1133 </tr>
1134 </table>
1135 </td>
1136 </tr>
1137 <tr>
1138 <td class='base'>$Lang::tr{'advproxy memory replacement policy'}:</td>
1139 <td class='base'><select name='MEM_POLICY'>
1140 <option value='LRU' $selected{'MEM_POLICY'}{'LRU'}>LRU</option>
1141 <option value='heap LFUDA' $selected{'MEM_POLICY'}{'heap LFUDA'}>heap LFUDA</option>
1142 <option value='heap GDSF' $selected{'MEM_POLICY'}{'heap GDSF'}>heap GDSF</option>
1143 <option value='heap LRU' $selected{'MEM_POLICY'}{'heap LRU'}>heap LRU</option>
1144 </select></td>
1145 </tr>
1146 <tr>
1147 <td class='base'>$Lang::tr{'advproxy cache replacement policy'}:</td>
1148 <td class='base'><select name='CACHE_POLICY'>
1149 <option value='LRU' $selected{'CACHE_POLICY'}{'LRU'}>LRU</option>
1150 <option value='heap LFUDA' $selected{'CACHE_POLICY'}{'heap LFUDA'}>heap LFUDA</option>
1151 <option value='heap GDSF' $selected{'CACHE_POLICY'}{'heap GDSF'}>heap GDSF</option>
1152 <option value='heap LRU' $selected{'CACHE_POLICY'}{'heap LRU'}>heap LRU</option>
1153 </select></td>
1154 </tr>
1155 <tr>
1156 <td colspan='2'>&nbsp;</td>
1157 </tr>
1158 <tr>
1159 <td class='base'>$Lang::tr{'advproxy offline mode'}:</td>
1160 <td><input type='checkbox' name='OFFLINE_MODE' $checked{'OFFLINE_MODE'}{'on'} /></td>
1161 </tr>
1162 <tr>
1163 <td class='base'>$Lang::tr{'advproxy cache-digest'}:</td>
1164 <td><input type='checkbox' name='CACHE_DIGESTS' $checked{'CACHE_DIGESTS'}{'on'} /></td>
1165 </tr>
1166 </table>
1167 <hr size='1'>
1168 <table width='100%'>
1169 <tr>
1170 <td colspan='4'><b>$Lang::tr{'advproxy destination ports'}</b></td>
1171 </tr>
1172 <tr>
1173 <td width='25%' align='center'></td> <td width='20%' align='center'></td><td width='25%' align='center'></td><td width='30%' align='center'></td>
1174 </tr>
1175 <tr>
1176 <td colspan='2' class='base'>$Lang::tr{'advproxy standard ports'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1177 <td colspan='2' class='base'>$Lang::tr{'advproxy ssl ports'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1178 </tr>
1179 <tr>
1180 <td colspan='2'><textarea name='PORTS_SAFE' cols='32' rows='6' wrap='off'>
1181 END
1182 ;
1183 if (!$proxysettings{'PORTS_SAFE'}) { print $def_ports_safe; } else { print $proxysettings{'PORTS_SAFE'}; }
1184
1185 print <<END
1186 </textarea></td>
1187 <td colspan='2'><textarea name='PORTS_SSL' cols='32' rows='6' wrap='off'>
1188 END
1189 ;
1190 if (!$proxysettings{'PORTS_SSL'}) { print $def_ports_ssl; } else { print $proxysettings{'PORTS_SSL'}; }
1191
1192 print <<END
1193 </textarea></td>
1194 </tr>
1195 </table>
1196 <hr size='1'>
1197 <table width='100%'>
1198 <tr>
1199 <td colspan='4'><b>$Lang::tr{'advproxy network based access'}</b></td>
1200 </tr>
1201 <tr>
1202 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1203 </tr>
1204 <tr>
1205 <td colspan='4' class='base'>$Lang::tr{'advproxy allowed subnets'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1206 </tr>
1207 <tr>
1208 <td colspan='2' rowspan='4'><textarea name='SRC_SUBNETS' cols='32' rows='3' wrap='off'>
1209 END
1210 ;
1211
1212 if (!$proxysettings{'SRC_SUBNETS'})
1213 {
1214 if (&Header::green_used()) {
1215 print "$green_cidr\n";
1216 }
1217
1218 if (&Header::blue_used()) {
1219 print "$blue_cidr\n";
1220 }
1221 } else { print $proxysettings{'SRC_SUBNETS'}; }
1222
1223 print <<END
1224 </textarea></td>
1225 END
1226 ;
1227
1228 $line = $Lang::tr{'advproxy no internal proxy on green'};
1229 $line =~ s/Green/<font color="$Header::colourgreen">Green<\/font>/i;
1230 print "<td class='base'>$line:</td>\n";
1231 print <<END
1232 <td><input type='checkbox' name='NO_PROXY_LOCAL' $checked{'NO_PROXY_LOCAL'}{'on'} /></td>
1233 </tr>
1234 END
1235 ;
1236 if ($netsettings{'BLUE_DEV'}) {
1237 $line = $Lang::tr{'advproxy no internal proxy on blue'};
1238 $line =~ s/Blue/<font color="$Header::colourblue">Blue<\/font>/i;
1239 print "<tr>\n";
1240 print "<td class='base'>$line:</td>\n";
1241 print <<END
1242 <td><input type='checkbox' name='NO_PROXY_LOCAL_BLUE' $checked{'NO_PROXY_LOCAL_BLUE'}{'on'} /></td>
1243 </tr>
1244 END
1245 ;
1246 }
1247 print <<END
1248 <tr>
1249 <td colspan='2'>&nbsp;</td>
1250 </tr>
1251 <tr>
1252 <td colspan='2'>&nbsp;</td>
1253 </tr>
1254 </table>
1255 <table width='100%'>
1256 <tr>
1257 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1258 </tr>
1259 <tr>
1260 <td colspan='2' class='base'>$Lang::tr{'advproxy unrestricted ip clients'}:</td>
1261 <td colspan='2' class='base'>$Lang::tr{'advproxy unrestricted mac clients'}:</td>
1262 </tr>
1263 <tr>
1264 <td colspan='2'><textarea name='SRC_UNRESTRICTED_IP' cols='32' rows='3' wrap='off'>
1265 END
1266 ;
1267
1268 print $proxysettings{'SRC_UNRESTRICTED_IP'};
1269
1270 print <<END
1271 </textarea></td>
1272 <td colspan='2'><textarea name='SRC_UNRESTRICTED_MAC' cols='32' rows='3' wrap='off'>
1273 END
1274 ;
1275
1276 print $proxysettings{'SRC_UNRESTRICTED_MAC'};
1277
1278 print <<END
1279 </textarea></td>
1280 </tr>
1281 </table>
1282 <table width='100%'>
1283 <tr>
1284 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1285 </tr>
1286 <tr>
1287 <td colspan='2' class='base'>$Lang::tr{'advproxy banned ip clients'}:</td>
1288 <td colspan='2' class='base'>$Lang::tr{'advproxy banned mac clients'}:</td>
1289 </tr>
1290 <tr>
1291 <td colspan='2'><textarea name='SRC_BANNED_IP' cols='32' rows='3' wrap='off'>
1292 END
1293 ;
1294
1295 print $proxysettings{'SRC_BANNED_IP'};
1296
1297 print <<END
1298 </textarea></td>
1299 <td colspan='2'><textarea name='SRC_BANNED_MAC' cols='32' rows='3' wrap='off'>
1300 END
1301 ;
1302
1303 print $proxysettings{'SRC_BANNED_MAC'};
1304
1305 print <<END
1306 </textarea></td>
1307 </tr>
1308 </table>
1309
1310 <hr size='1'>
1311
1312 END
1313 ;
1314 # -------------------------------------------------------------------
1315 # CRE GUI - optional
1316 # -------------------------------------------------------------------
1317
1318 if (-e $cre_enabled) { print <<END
1319 <table width='100%'>
1320
1321 <tr>
1322 <td colspan='4'><b>$Lang::tr{'advproxy classroom extensions'}</b> $Lang::tr{'advproxy enabled'}:<input type='checkbox' name='CLASSROOM_EXT' $checked{'CLASSROOM_EXT'}{'on'} /></td>
1323 </tr>
1324 <tr>
1325 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1326 </tr>
1327 <tr>
1328
1329 END
1330 ;
1331 if ($proxysettings{'CLASSROOM_EXT'} eq 'on'){
1332 print <<END
1333 <td class='base'>$Lang::tr{'advproxy supervisor password'}:</td>
1334 <td><input type='password' name='SUPERVISOR_PASSWORD' value='$proxysettings{'SUPERVISOR_PASSWORD'}' size='12' /></td>
1335 </tr>
1336 <tr>
1337 <td colspan='2' class='base'>$Lang::tr{'advproxy cre group definitions'}:</td>
1338 <td colspan='2' class='base'>$Lang::tr{'advproxy cre supervisors'}:</td>
1339 END
1340 ;
1341 }
1342 print "</tr>";
1343 if ($proxysettings{'CLASSROOM_EXT'} eq 'on'){
1344 print <<END
1345 <tr>
1346 <td colspan='2'><textarea name='CRE_GROUPS' cols='32' rows='6' wrap='off'>
1347 END
1348 ;
1349
1350 print $proxysettings{'CRE_GROUPS'};
1351
1352 print <<END
1353 </textarea></td>
1354 <td colspan='2'><textarea name='CRE_SVHOSTS' cols='32' rows='6' wrap='off'>
1355 END
1356 ;
1357 print $proxysettings{'CRE_SVHOSTS'};
1358
1359 print <<END
1360 </textarea></td>
1361 </tr>
1362 END
1363 ;
1364 }
1365 print "</table><hr size='1'>";
1366
1367 } else {
1368 print <<END
1369 <input type='hidden' name='SUPERVISOR_PASSWORD' value='$proxysettings{'SUPERVISOR_PASSWORD'}' />
1370 <input type='hidden' name='CRE_GROUPS' value='$proxysettings{'CRE_GROUPS'}' />
1371 <input type='hidden' name='CRE_SVHOSTS' value='$proxysettings{'CRE_SVHOSTS'}' />
1372 END
1373 ;
1374 }
1375
1376 # ===================================================================
1377 # WPAD settings
1378 # ===================================================================
1379
1380 print <<END
1381 <table width='100%'>
1382 <tr>
1383 <td colspan='4'><b>$Lang::tr{'advproxy wpad title'}</b></td>
1384 </tr>
1385 <tr>
1386 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1387 </tr>
1388 <tr>
1389 <td colspan='2' class='base'>$Lang::tr{'advproxy wpad label dst_noproxy_ip'}:</td>
1390 <td colspan='2' class='base'>$Lang::tr{'advproxy wpad label dst_noproxy_url'}:</td>
1391 </tr>
1392 <tr>
1393 <td colspan='2'><textarea name='DST_NOPROXY_IP' cols='32' rows='3' wrap='off'>
1394 END
1395 ;
1396
1397 print $proxysettings{'DST_NOPROXY_IP'};
1398
1399 print <<END
1400 </textarea></td>
1401
1402 <td colspan='2'><textarea name='DST_NOPROXY_URL' cols='32' rows='3' wrap='off'>
1403 END
1404 ;
1405
1406 print $proxysettings{'DST_NOPROXY_URL'};
1407
1408 print <<END
1409 </textarea></td>
1410 </tr>
1411 <tr>
1412 <td colspan='2' class='base'>$Lang::tr{'advproxy wpad example dst_noproxy_ip'}</td>
1413 <td colspan='2' class='base'>$Lang::tr{'advproxy wpad example dst_noproxy_url'}</td>
1414 </tr>
1415 <tr>
1416 <td colspan="4">&nbsp;</td>
1417 </tr>
1418 <tr>
1419 <td colspan="4">$Lang::tr{'advproxy wpad view pac'}: <a href="http://$ENV{SERVER_ADDR}:81/wpad.dat" target="_blank">http://$ENV{SERVER_ADDR}:81/wpad.dat</a></td>
1420 </tr>
1421 <tr>
1422 <td colspan="4">&nbsp;</td>
1423 </tr>
1424 <tr>
1425 <td colspan="4">$Lang::tr{'advproxy wpad notice'}</td>
1426 </tr>
1427 </table>
1428
1429 <hr size='1'>
1430
1431 END
1432 ;
1433
1434 # -------------------------------------------------------------------
1435
1436 print <<END
1437
1438 <table width='100%'>
1439 <tr>
1440 <td colspan='4'><b>$Lang::tr{'advproxy time restrictions'}</b></td>
1441 </tr>
1442 <table width='100%'>
1443 <tr>
1444 <td width='2%'>$Lang::tr{'advproxy access'}</td>
1445 <td width='1%'>&nbsp;</td>
1446 <td width='2%' align='center'>$Lang::tr{'advproxy monday'}</td>
1447 <td width='2%' align='center'>$Lang::tr{'advproxy tuesday'}</td>
1448 <td width='2%' align='center'>$Lang::tr{'advproxy wednesday'}</td>
1449 <td width='2%' align='center'>$Lang::tr{'advproxy thursday'}</td>
1450 <td width='2%' align='center'>$Lang::tr{'advproxy friday'}</td>
1451 <td width='2%' align='center'>$Lang::tr{'advproxy saturday'}</td>
1452 <td width='2%' align='center'>$Lang::tr{'advproxy sunday'}</td>
1453 <td width='1%'>&nbsp;&nbsp;</td>
1454 <td width='7%' colspan=3>$Lang::tr{'advproxy from'}</td>
1455 <td width='1%'>&nbsp;</td>
1456 <td width='7%' colspan=3>$Lang::tr{'advproxy to'}</td>
1457 <td>&nbsp;</td>
1458 </tr>
1459 <tr>
1460 <td class='base'>
1461 <select name='TIME_ACCESS_MODE'>
1462 <option value='allow' $selected{'TIME_ACCESS_MODE'}{'allow'}>$Lang::tr{'advproxy mode allow'}</option>
1463 <option value='deny' $selected{'TIME_ACCESS_MODE'}{'deny'}>$Lang::tr{'advproxy mode deny'}</option>
1464 </select>
1465 </td>
1466 <td>&nbsp;</td>
1467 <td class='base'><input type='checkbox' name='TIME_MON' $checked{'TIME_MON'}{'on'} /></td>
1468 <td class='base'><input type='checkbox' name='TIME_TUE' $checked{'TIME_TUE'}{'on'} /></td>
1469 <td class='base'><input type='checkbox' name='TIME_WED' $checked{'TIME_WED'}{'on'} /></td>
1470 <td class='base'><input type='checkbox' name='TIME_THU' $checked{'TIME_THU'}{'on'} /></td>
1471 <td class='base'><input type='checkbox' name='TIME_FRI' $checked{'TIME_FRI'}{'on'} /></td>
1472 <td class='base'><input type='checkbox' name='TIME_SAT' $checked{'TIME_SAT'}{'on'} /></td>
1473 <td class='base'><input type='checkbox' name='TIME_SUN' $checked{'TIME_SUN'}{'on'} /></td>
1474 <td>&nbsp;</td>
1475 <td class='base'>
1476 <select name='TIME_FROM_HOUR'>
1477 END
1478 ;
1479 for ($i=0;$i<=24;$i++) {
1480 $_ = sprintf("%02s",$i);
1481 print "<option $selected{'TIME_FROM_HOUR'}{$_}>$_</option>\n";
1482 }
1483 print <<END
1484 </select>
1485 </td>
1486 <td>:</td>
1487 <td class='base'>
1488 <select name='TIME_FROM_MINUTE'>
1489 END
1490 ;
1491 for ($i=0;$i<=45;$i+=15) {
1492 $_ = sprintf("%02s",$i);
1493 print "<option $selected{'TIME_FROM_MINUTE'}{$_}>$_</option>\n";
1494 }
1495 print <<END
1496 </select>
1497 <td> - </td>
1498 </td>
1499 <td class='base'>
1500 <select name='TIME_TO_HOUR'>
1501 END
1502 ;
1503 for ($i=0;$i<=24;$i++) {
1504 $_ = sprintf("%02s",$i);
1505 print "<option $selected{'TIME_TO_HOUR'}{$_}>$_</option>\n";
1506 }
1507 print <<END
1508 </select>
1509 </td>
1510 <td>:</td>
1511 <td class='base'>
1512 <select name='TIME_TO_MINUTE'>
1513 END
1514 ;
1515 for ($i=0;$i<=45;$i+=15) {
1516 $_ = sprintf("%02s",$i);
1517 print "<option $selected{'TIME_TO_MINUTE'}{$_}>$_</option>\n";
1518 }
1519 print <<END
1520 </select>
1521 </td>
1522 </tr>
1523 </table>
1524 <hr size='1'>
1525 <table width='100%'>
1526 <tr>
1527 <td colspan='4'><b>$Lang::tr{'advproxy transfer limits'}</b></td>
1528 </tr>
1529 <tr>
1530 <td width='25%' class='base'>$Lang::tr{'advproxy max download size'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1531 <td width='20%'><input type='text' name='MAX_INCOMING_SIZE' value='$proxysettings{'MAX_INCOMING_SIZE'}' size='5' /></td>
1532 <td width='25%' class='base'>$Lang::tr{'advproxy max upload size'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1533 <td width='30%'><input type='text' name='MAX_OUTGOING_SIZE' value='$proxysettings{'MAX_OUTGOING_SIZE'}' size='5' /></td>
1534 </tr>
1535 </table>
1536 <hr size='1'>
1537 <table width='100%'>
1538 <tr>
1539 <td colspan='4'><b>$Lang::tr{'advproxy download throttling'}</b></td>
1540 </tr>
1541 <tr>
1542 <td width='25%' class='base'>$Lang::tr{'advproxy throttling total on'} <font color="$Header::colourgreen">Green</font>:</td>
1543 <td width='20%' class='base'>
1544 <select name='THROTTLING_GREEN_TOTAL'>
1545 END
1546 ;
1547
1548 foreach (@throttle_limits) {
1549 my $val = $_;
1550 my $unit = "kbit/s";
1551
1552 if ($val >= 1024) {
1553 $unit = "Mbit/s";
1554 $val /= 1024;
1555 }
1556
1557 print "\t<option value='$_' $selected{'THROTTLING_GREEN_TOTAL'}{$_}>$val $unit</option>\n";
1558 }
1559
1560 print <<END
1561 <option value='0' $selected{'THROTTLING_GREEN_TOTAL'}{'unlimited'}>$Lang::tr{'advproxy throttling unlimited'}</option>\n";
1562 </select>
1563 </td>
1564 <td width='25%' class='base'>$Lang::tr{'advproxy throttling per host on'} <font color="$Header::colourgreen">Green</font>:</td>
1565 <td width='30%' class='base'>
1566 <select name='THROTTLING_GREEN_HOST'>
1567 END
1568 ;
1569
1570 foreach (@throttle_limits) {
1571 print "\t<option value='$_' $selected{'THROTTLING_GREEN_HOST'}{$_}>$_ kbit/s</option>\n";
1572 }
1573
1574 print <<END
1575 <option value='0' $selected{'THROTTLING_GREEN_HOST'}{'unlimited'}>$Lang::tr{'advproxy throttling unlimited'}</option>\n";
1576 </select>
1577 </td>
1578 </tr>
1579 END
1580 ;
1581
1582 if ($netsettings{'BLUE_DEV'}) {
1583 print <<END
1584 <tr>
1585 <td class='base'>$Lang::tr{'advproxy throttling total on'} <font color="$Header::colourblue">Blue</font>:</td>
1586 <td class='base'>
1587 <select name='THROTTLING_BLUE_TOTAL'>
1588 END
1589 ;
1590
1591 foreach (@throttle_limits) {
1592 print "\t<option value='$_' $selected{'THROTTLING_BLUE_TOTAL'}{$_}>$_ kbit/s</option>\n";
1593 }
1594
1595 print <<END
1596 <option value='0' $selected{'THROTTLING_BLUE_TOTAL'}{'unlimited'}>$Lang::tr{'advproxy throttling unlimited'}</option>\n";
1597 </select>
1598 </td>
1599 <td class='base'>$Lang::tr{'advproxy throttling per host on'} <font color="$Header::colourblue">Blue</font>:</td>
1600 <td class='base'>
1601 <select name='THROTTLING_BLUE_HOST'>
1602 END
1603 ;
1604
1605 foreach (@throttle_limits) {
1606 print "\t<option value='$_' $selected{'THROTTLING_BLUE_HOST'}{$_}>$_ kbit/s</option>\n";
1607 }
1608
1609 print <<END
1610 <option value='0' $selected{'THROTTLING_BLUE_HOST'}{'unlimited'}>$Lang::tr{'advproxy throttling unlimited'}</option>\n";
1611 </select>
1612 </td>
1613 </tr>
1614 END
1615 ;
1616 }
1617
1618 print <<END
1619 </table>
1620 <hr size='1'>
1621 <table width='100%'>
1622 <tr>
1623 <td colspan='4'><b>$Lang::tr{'advproxy MIME filter'}</b> $Lang::tr{'advproxy enabled'}:<input type='checkbox' name='ENABLE_MIME_FILTER' $checked{'ENABLE_MIME_FILTER'}{'on'} /></td>
1624 </tr>
1625 END
1626 ;
1627 if ( $proxysettings{'ENABLE_MIME_FILTER'} eq 'on' ){
1628 print <<END
1629 <tr>
1630 <td colspan='2' class='base'>$Lang::tr{'advproxy MIME block types'}:</td>
1631 <td>&nbsp;</td>
1632 <td>&nbsp;</td>
1633 </tr>
1634 <tr>
1635 <td colspan='2'><textarea name='MIME_TYPES' cols='32' rows='6' wrap='off'>
1636 END
1637 ;
1638
1639 print $proxysettings{'MIME_TYPES'};
1640
1641 print <<END
1642 </textarea></td>
1643 <td>&nbsp;</td>
1644 <td>&nbsp;</td>
1645 </tr>
1646 END
1647 ;
1648 }
1649 print <<END
1650 </table>
1651
1652 <hr size='1'>
1653
1654 <table width='100%'>
1655 <tr>
1656 <td><b>$Lang::tr{'advproxy asbased anomaly detection'}</b></td>
1657 </tr>
1658 <tr>
1659 <td class='base'>$Lang::tr{'advproxy fastflux detection'}:</td>
1660 <td><input type='checkbox' name='ASNBL_FASTFLUX_DETECTION' $checked{'ASNBL_FASTFLUX_DETECTION'}{'on'} /></td>
1661 <td class='base'>$Lang::tr{'advproxy fastflux detection threshold'}:</td>
1662 <td><input type='text' name='ASNBL_FASTFLUX_THRESHOLD' value='$proxysettings{'ASNBL_FASTFLUX_THRESHOLD'}' size=2 /></td>
1663 </tr>
1664 <tr>
1665 <td class='base'>$Lang::tr{'advproxy selectively announcements detection'}:</td>
1666 <td colspan='3'><input type='checkbox' name='ASNBL_SELECANN_DETECTION' $checked{'ASNBL_SELECANN_DETECTION'}{'on'} /></td>
1667 </tr>
1668 </table>
1669
1670 <hr size='1'>
1671 END
1672 ;
1673
1674 my $auth_columns = 5;
1675 if ($HAVE_NTLM_AUTH) {
1676 $auth_columns++;
1677 }
1678 my $auth_column_width = 100 / $auth_columns;
1679
1680 print <<END;
1681 <table width='100%'>
1682 <tr>
1683 <td colspan='$auth_columns'><b>$Lang::tr{'advproxy AUTH method'}</b></td>
1684 </tr>
1685 <tr>
1686 <td width='$auth_column_width%' class='base'><input type='radio' name='AUTH_METHOD' value='none' $checked{'AUTH_METHOD'}{'none'} />$Lang::tr{'advproxy AUTH method none'}</td>
1687 <td width='$auth_column_width%' class='base'><input type='radio' name='AUTH_METHOD' value='ncsa' $checked{'AUTH_METHOD'}{'ncsa'} />$Lang::tr{'advproxy AUTH method ncsa'}</td>
1688 <td width='$auth_column_width%' class='base'><input type='radio' name='AUTH_METHOD' value='ident' $checked{'AUTH_METHOD'}{'ident'} />$Lang::tr{'advproxy AUTH method ident'}</td>
1689 <td width='$auth_column_width%' class='base'><input type='radio' name='AUTH_METHOD' value='ldap' $checked{'AUTH_METHOD'}{'ldap'} />$Lang::tr{'advproxy AUTH method ldap'}</td>
1690 END
1691
1692 if ($HAVE_NTLM_AUTH) {
1693 print <<END;
1694 <td width='$auth_column_width%' class='base'><input type='radio' name='AUTH_METHOD' value='ntlm-auth' $checked{'AUTH_METHOD'}{'ntlm-auth'} />$Lang::tr{'advproxy AUTH method ntlm auth'}</td>
1695 END
1696 }
1697
1698 print <<END
1699 <td width='$auth_column_width%' class='base'><input type='radio' name='AUTH_METHOD' value='radius' $checked{'AUTH_METHOD'}{'radius'} />$Lang::tr{'advproxy AUTH method radius'}</td>
1700 </tr>
1701 </table>
1702 END
1703 ;
1704
1705 if (!($proxysettings{'AUTH_METHOD'} eq 'none')) { if (!($proxysettings{'AUTH_METHOD'} eq 'ident')) { print <<END
1706 <hr size='1'>
1707 <table width='100%'>
1708 <tr>
1709 <td colspan='4'><b>$Lang::tr{'advproxy AUTH global settings'}</b></td>
1710 </tr>
1711 <tr>
1712 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1713 </tr>
1714 <tr>
1715 <td class='base'>$Lang::tr{'advproxy AUTH number of auth processes'}:</td>
1716 <td><input type='text' name='AUTH_CHILDREN' value='$proxysettings{'AUTH_CHILDREN'}' size='5' /></td>
1717 <td colspan='2' rowspan= '6' valign='top' class='base'>
1718 <table cellpadding='0' cellspacing='0'>
1719 <tr>
1720 <td class='base'>$Lang::tr{'advproxy AUTH realm'}:</td>
1721 </tr>
1722 <tr>
1723 <!-- intentionally left empty -->
1724 </tr>
1725 <tr>
1726 <!-- intentionally left empty -->
1727 </tr>
1728 <tr>
1729 <td><input type='text' name='AUTH_REALM' value='$proxysettings{'AUTH_REALM'}' size='40' /></td>
1730 </tr>
1731 <tr>
1732 <!-- intentionally left empty -->
1733 </tr>
1734 <tr>
1735 <!-- intentionally left empty -->
1736 </tr>
1737 <tr>
1738 <td>$Lang::tr{'advproxy AUTH no auth'}:</td>
1739 </tr>
1740 <tr>
1741 <!-- intentionally left empty -->
1742 </tr>
1743 <tr>
1744 <!-- intentionally left empty -->
1745 </tr>
1746 <tr>
1747 <td><textarea name='DST_NOAUTH' cols='32' rows='6' wrap='off'>
1748 END
1749 ;
1750
1751 print $proxysettings{'DST_NOAUTH'};
1752
1753 print <<END
1754 </textarea></td>
1755 </tr>
1756 </table>
1757 </td>
1758 </tr>
1759 <tr>
1760 <td class='base'>$Lang::tr{'advproxy AUTH auth cache TTL'}:</td>
1761 <td><input type='text' name='AUTH_CACHE_TTL' value='$proxysettings{'AUTH_CACHE_TTL'}' size='5' /></td>
1762 </tr>
1763 <tr>
1764 <td class='base'>$Lang::tr{'advproxy AUTH limit of IP addresses'}:</td>
1765 <td><input type='text' name='AUTH_MAX_USERIP' value='$proxysettings{'AUTH_MAX_USERIP'}' size='5' /></td>
1766 </tr>
1767 <tr>
1768 <td class='base'>$Lang::tr{'advproxy AUTH user IP cache TTL'}:</td>
1769 <td><input type='text' name='AUTH_IPCACHE_TTL' value='$proxysettings{'AUTH_IPCACHE_TTL'}' size='5' /></td>
1770 </tr>
1771 <tr>
1772 <td class='base'>$Lang::tr{'advproxy AUTH always required'}:</td>
1773 <td><input type='checkbox' name='AUTH_ALWAYS_REQUIRED' $checked{'AUTH_ALWAYS_REQUIRED'}{'on'} /></td>
1774 </tr>
1775 <tr>
1776 <td colspan='2'>&nbsp;</td>
1777 </tr>
1778 </table>
1779 END
1780 ;
1781 }
1782
1783 # ===================================================================
1784 # NCSA auth settings
1785 # ===================================================================
1786
1787 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa') {
1788 print <<END
1789 <hr size='1'>
1790 <table width='100%'>
1791 <tr>
1792 <td colspan='4'><b>$Lang::tr{'advproxy NCSA auth'}</b></td>
1793 </tr>
1794 <tr>
1795 <td width='25%' class='base'>$Lang::tr{'advproxy NCSA min password length'}:</td>
1796 <td width='20%'><input type='text' name='NCSA_MIN_PASS_LEN' value='$proxysettings{'NCSA_MIN_PASS_LEN'}' size='5' /></td>
1797 <td width='25%' class='base'>$Lang::tr{'advproxy NCSA redirector bypass'} \'$Lang::tr{'advproxy NCSA grp extended'}\':</td>
1798 <td width='20%'><input type='checkbox' name='NCSA_BYPASS_REDIR' $checked{'NCSA_BYPASS_REDIR'}{'on'} /></td>
1799 </tr>
1800 <tr>
1801 <td colspan='2'><br>&nbsp;<input type='submit' name='ACTION' value='$Lang::tr{'advproxy NCSA user management'}'></td>
1802 <td>&nbsp;</td>
1803 <td>&nbsp;</td>
1804 </tr>
1805 </table>
1806 END
1807 ; }
1808
1809 # ===================================================================
1810 # IDENTD auth settings
1811 # ===================================================================
1812
1813 if ($proxysettings{'AUTH_METHOD'} eq 'ident') {
1814 print <<END
1815 <hr size ='1'>
1816 <table width='100%'>
1817 <tr>
1818 <td colspan='4'><b>$Lang::tr{'advproxy IDENT identd settings'}</b></td>
1819 </tr>
1820 <tr>
1821 <td width='25%' class='base'>$Lang::tr{'advproxy IDENT required'}:</td>
1822 <td width='20%'><input type='checkbox' name='IDENT_REQUIRED' $checked{'IDENT_REQUIRED'}{'on'} /></td>
1823 <td width='25%' class='base'>$Lang::tr{'advproxy AUTH always required'}:</td>
1824 <td width='30%'><input type='checkbox' name='AUTH_ALWAYS_REQUIRED' $checked{'AUTH_ALWAYS_REQUIRED'}{'on'} /></td>
1825 </tr>
1826 <tr>
1827 <td class='base'>$Lang::tr{'advproxy IDENT timeout'}:</td>
1828 <td><input type='text' name='IDENT_TIMEOUT' value='$proxysettings{'IDENT_TIMEOUT'}' size='5' /></td>
1829 <td>&nbsp;</td>
1830 <td>&nbsp;</td>
1831 </tr>
1832 <tr>
1833 <td colspan='2' class='base'>$Lang::tr{'advproxy IDENT aware hosts'}:</td>
1834 <td colspan='2' class='base'>$Lang::tr{'advproxy AUTH no auth'}:</td>
1835 </tr>
1836 <tr>
1837 <td colspan='2'><textarea name='IDENT_HOSTS' cols='32' rows='6' wrap='off'>
1838 END
1839 ;
1840 if (!$proxysettings{'IDENT_HOSTS'}) {
1841 if (&Header::green_used()) {
1842 print "$green_cidr\n";
1843 }
1844
1845 if (&Header::blue_used()) {
1846 print "$blue_cidr\n";
1847 }
1848 } else {
1849 print $proxysettings{'IDENT_HOSTS'};
1850 }
1851
1852 print <<END
1853 </textarea></td>
1854 <td colspan='2'><textarea name='DST_NOAUTH' cols='32' rows='6' wrap='off'>
1855 END
1856 ;
1857
1858 print $proxysettings{'DST_NOAUTH'};
1859
1860 print <<END
1861 </textarea></td>
1862 </tr>
1863 </table>
1864 <hr size ='1'>
1865 <table width='100%'>
1866 <tr>
1867 <td colspan='4'><b>$Lang::tr{'advproxy IDENT user based access restrictions'}</b></td>
1868 </tr>
1869 <tr>
1870 <td width='25%' class='base'>$Lang::tr{'advproxy enabled'}:</td>
1871 <td width='20%'><input type='checkbox' name='IDENT_ENABLE_ACL' $checked{'IDENT_ENABLE_ACL'}{'on'} /></td>
1872 <td width='25%'>&nbsp;</td>
1873 <td width='30%'>&nbsp;</td>
1874 </tr>
1875 <tr>
1876 <td colspan='2'><input type='radio' name='IDENT_USER_ACL' value='positive' $checked{'IDENT_USER_ACL'}{'positive'} />
1877 $Lang::tr{'advproxy IDENT use positive access list'}:</td>
1878 <td colspan='2'><input type='radio' name='IDENT_USER_ACL' value='negative' $checked{'IDENT_USER_ACL'}{'negative'} />
1879 $Lang::tr{'advproxy IDENT use negative access list'}:</td>
1880 </tr>
1881 <tr>
1882 <td colspan='2'>$Lang::tr{'advproxy IDENT authorized users'}</td>
1883 <td colspan='2'>$Lang::tr{'advproxy IDENT unauthorized users'}</td>
1884 </tr>
1885 <tr>
1886 <td colspan='2'><textarea name='IDENT_ALLOW_USERS' cols='32' rows='6' wrap='off'>
1887 END
1888 ; }
1889
1890 if ($proxysettings{'AUTH_METHOD'} eq 'ident') { print $proxysettings{'IDENT_ALLOW_USERS'}; }
1891
1892 if ($proxysettings{'AUTH_METHOD'} eq 'ident') { print <<END
1893 </textarea></td>
1894 <td colspan='2'><textarea name='IDENT_DENY_USERS' cols='32' rows='6' wrap='off'>
1895 END
1896 ; }
1897
1898 if ($proxysettings{'AUTH_METHOD'} eq 'ident') { print $proxysettings{'IDENT_DENY_USERS'}; }
1899
1900 if ($proxysettings{'AUTH_METHOD'} eq 'ident') { print <<END
1901 </textarea></td>
1902 </tr>
1903 </table>
1904 END
1905 ; }
1906
1907 # ===================================================================
1908 # NTLM-AUTH settings
1909 # ===================================================================
1910
1911 if ($proxysettings{'AUTH_METHOD'} eq 'ntlm-auth') {
1912 print <<END;
1913 <hr size ='1'>
1914 <table width='100%'>
1915 <td width='20%' class='base'>$Lang::tr{'advproxy basic authentication'}:</td>
1916 <td width='40%'><input type='checkbox' name='NTLM_AUTH_BASIC' $checked{'NTLM_AUTH_BASIC'}{'on'} /></td>
1917 <td colspan='2'>&nbsp;</td>
1918 </table>
1919
1920 <hr size='1' />
1921
1922 <table width='100%'>
1923 <tr>
1924 <td colspan='4'><b>$Lang::tr{'advproxy group access control'}</b></td>
1925 </tr>
1926 <tr>
1927 <td width='20%' class='base'>$Lang::tr{'advproxy group required'}:</td>
1928 <td width='40%'><input type='text' name='NTLM_AUTH_GROUP' value='$proxysettings{'NTLM_AUTH_GROUP'}' size='37' /></td>
1929 <td>&nbsp;</td>
1930 <td>&nbsp;</td>
1931 </tr>
1932 </table>
1933 END
1934 }
1935
1936 # ===================================================================
1937 # LDAP auth settings
1938 # ===================================================================
1939
1940 if ($proxysettings{'AUTH_METHOD'} eq 'ldap') {
1941 print <<END
1942 <hr size='1'>
1943 <table width='100%'>
1944 <tr>
1945 <td colspan='4'><b>$Lang::tr{'advproxy LDAP common settings'}</b></td>
1946 </tr>
1947 <tr>
1948 <td class='base'>$Lang::tr{'advproxy LDAP basedn'}:</td>
1949 <td><input type='text' name='LDAP_BASEDN' value='$proxysettings{'LDAP_BASEDN'}' size='37' /></td>
1950 <td class='base'>$Lang::tr{'advproxy LDAP type'}:</td>
1951 <td class='base'><select name='LDAP_TYPE'>
1952 <option value='ADS' $selected{'LDAP_TYPE'}{'ADS'}>$Lang::tr{'advproxy LDAP ADS'}</option>
1953 <option value='NDS' $selected{'LDAP_TYPE'}{'NDS'}>$Lang::tr{'advproxy LDAP NDS'}</option>
1954 <option value='V2' $selected{'LDAP_TYPE'}{'V2'}>$Lang::tr{'advproxy LDAP V2'}</option>
1955 <option value='V3' $selected{'LDAP_TYPE'}{'V3'}>$Lang::tr{'advproxy LDAP V3'}</option>
1956 </select></td>
1957 </tr>
1958 <tr>
1959 <td width='20%' class='base'>$Lang::tr{'advproxy LDAP server'}:</td>
1960 <td width='40%'><input type='text' name='LDAP_SERVER' value='$proxysettings{'LDAP_SERVER'}' size='14' /></td>
1961 <td width='20%' class='base'>$Lang::tr{'advproxy LDAP port'}:</td>
1962 <td><input type='text' name='LDAP_PORT' value='$proxysettings{'LDAP_PORT'}' size='3' /></td>
1963 </tr>
1964 </table>
1965 <hr size ='1'>
1966 <table width='100%'>
1967 <tr>
1968 <td colspan='4'><b>$Lang::tr{'advproxy LDAP binddn settings'}</b></td>
1969 </tr>
1970 <tr>
1971 <td width='20%' class='base'>$Lang::tr{'advproxy LDAP binddn username'}:</td>
1972 <td width='40%'><input type='text' name='LDAP_BINDDN_USER' value='$proxysettings{'LDAP_BINDDN_USER'}' size='37' /></td>
1973 <td width='20%' class='base'>$Lang::tr{'advproxy LDAP binddn password'}:</td>
1974 <td><input type='password' name='LDAP_BINDDN_PASS' value='$proxysettings{'LDAP_BINDDN_PASS'}' size='14' /></td>
1975 </tr>
1976 </table>
1977 <hr size ='1'>
1978 <table width='100%'>
1979 <tr>
1980 <td colspan='4'><b>$Lang::tr{'advproxy LDAP group access control'}</b></td>
1981 </tr>
1982 <tr>
1983 <td width='20%' class='base'>$Lang::tr{'advproxy LDAP group required'}:</td>
1984 <td width='40%'><input type='text' name='LDAP_GROUP' value='$proxysettings{'LDAP_GROUP'}' size='37' /></td>
1985 <td>&nbsp;</td>
1986 <td>&nbsp;</td>
1987 </tr>
1988 </table>
1989 END
1990 ; }
1991
1992 # ===================================================================
1993 # RADIUS auth settings
1994 # ===================================================================
1995
1996 if ($proxysettings{'AUTH_METHOD'} eq 'radius') {
1997 print <<END
1998 <hr size='1'>
1999 <table width='100%'>
2000 <tr>
2001 <td colspan='4'><b>$Lang::tr{'advproxy RADIUS radius settings'}</b></td>
2002 </tr>
2003 <tr>
2004 <td width='25%' class='base'>$Lang::tr{'advproxy RADIUS server'}:</td>
2005 <td width='20%'><input type='text' name='RADIUS_SERVER' value='$proxysettings{'RADIUS_SERVER'}' size='14' /></td>
2006 <td width='25%' class='base'>$Lang::tr{'advproxy RADIUS port'}:</td>
2007 <td width='30%'><input type='text' name='RADIUS_PORT' value='$proxysettings{'RADIUS_PORT'}' size='3' /></td>
2008 </tr>
2009 <tr>
2010 <td class='base'>$Lang::tr{'advproxy RADIUS identifier'}:</td>
2011 <td><input type='text' name='RADIUS_IDENTIFIER' value='$proxysettings{'RADIUS_IDENTIFIER'}' size='14' /></td>
2012 <td class='base'>$Lang::tr{'advproxy RADIUS secret'}:</td>
2013 <td><input type='password' name='RADIUS_SECRET' value='$proxysettings{'RADIUS_SECRET'}' size='14' /></td>
2014 </tr>
2015 </table>
2016 <hr size ='1'>
2017 <table width='100%'>
2018 <tr>
2019 <td colspan='4'><b>$Lang::tr{'advproxy RADIUS user based access restrictions'}</b></td>
2020 </tr>
2021 <tr>
2022 <td width='25%' class='base'>$Lang::tr{'advproxy enabled'}:</td>
2023 <td width='20%'><input type='checkbox' name='RADIUS_ENABLE_ACL' $checked{'RADIUS_ENABLE_ACL'}{'on'} /></td>
2024 <td width='25%'>&nbsp;</td>
2025 <td width='30%'>&nbsp;</td>
2026 </tr>
2027 <tr>
2028 <td colspan='2'><input type='radio' name='RADIUS_USER_ACL' value='positive' $checked{'RADIUS_USER_ACL'}{'positive'} />
2029 $Lang::tr{'advproxy RADIUS use positive access list'}:</td>
2030 <td colspan='2'><input type='radio' name='RADIUS_USER_ACL' value='negative' $checked{'RADIUS_USER_ACL'}{'negative'} />
2031 $Lang::tr{'advproxy RADIUS use negative access list'}:</td>
2032 </tr>
2033 <tr>
2034 <td colspan='2'>$Lang::tr{'advproxy RADIUS authorized users'}</td>
2035 <td colspan='2'>$Lang::tr{'advproxy RADIUS unauthorized users'}</td>
2036 </tr>
2037 <tr>
2038 <td colspan='2'><textarea name='RADIUS_ALLOW_USERS' cols='32' rows='6' wrap='off'>
2039 END
2040 ; }
2041
2042 if ($proxysettings{'AUTH_METHOD'} eq 'radius') { print $proxysettings{'RADIUS_ALLOW_USERS'}; }
2043
2044 if ($proxysettings{'AUTH_METHOD'} eq 'radius') { print <<END
2045 </textarea></td>
2046 <td colspan='2'><textarea name='RADIUS_DENY_USERS' cols='32' rows='6' wrap='off'>
2047 END
2048 ; }
2049
2050 if ($proxysettings{'AUTH_METHOD'} eq 'radius') { print $proxysettings{'RADIUS_DENY_USERS'}; }
2051
2052 if ($proxysettings{'AUTH_METHOD'} eq 'radius') { print <<END
2053 </textarea></td>
2054 </tr>
2055 </table>
2056 END
2057 ; }
2058
2059 # ===================================================================
2060
2061 }
2062
2063 print "<table>\n";
2064
2065 if ($proxysettings{'AUTH_METHOD'} eq 'none') {
2066 print <<END
2067 <td><input type='hidden' name='AUTH_CHILDREN' value='$proxysettings{'AUTH_CHILDREN'}'></td>
2068 <td><input type='hidden' name='AUTH_CACHE_TTL' value='$proxysettings{'AUTH_CACHE_TTL'}' size='5' /></td>
2069 <td><input type='hidden' name='AUTH_MAX_USERIP' value='$proxysettings{'AUTH_MAX_USERIP'}' size='5' /></td>
2070 <td><input type='hidden' name='AUTH_IPCACHE_TTL' value='$proxysettings{'AUTH_IPCACHE_TTL'}' size='5' /></td>
2071 <td><input type='hidden' name='AUTH_ALWAYS_REQUIRED' value='$proxysettings{'AUTH_ALWAYS_REQUIRED'}'></td>
2072 <td><input type='hidden' name='AUTH_REALM' value='$proxysettings{'AUTH_REALM'}'></td>
2073 <td><input type='hidden' name='DST_NOAUTH' value='$proxysettings{'DST_NOAUTH'}'></td>
2074 END
2075 ; }
2076
2077 if ($proxysettings{'AUTH_METHOD'} eq 'ident') {
2078 print <<END
2079 <td><input type='hidden' name='AUTH_CHILDREN' value='$proxysettings{'AUTH_CHILDREN'}'></td>
2080 <td><input type='hidden' name='AUTH_CACHE_TTL' value='$proxysettings{'AUTH_CACHE_TTL'}' size='5' /></td>
2081 <td><input type='hidden' name='AUTH_MAX_USERIP' value='$proxysettings{'AUTH_MAX_USERIP'}' size='5' /></td>
2082 <td><input type='hidden' name='AUTH_IPCACHE_TTL' value='$proxysettings{'AUTH_IPCACHE_TTL'}' size='5' /></td>
2083 <td><input type='hidden' name='AUTH_REALM' value='$proxysettings{'AUTH_REALM'}'></td>
2084 END
2085 ; }
2086
2087 if (!($proxysettings{'AUTH_METHOD'} eq 'ncsa')) {
2088 print <<END
2089 <td><input type='hidden' name='NCSA_MIN_PASS_LEN' value='$proxysettings{'NCSA_MIN_PASS_LEN'}'></td>
2090 <td><input type='hidden' name='NCSA_BYPASS_REDIR' value='$proxysettings{'NCSA_BYPASS_REDIR'}'></td>
2091 END
2092 ; }
2093
2094 if (!($proxysettings{'AUTH_METHOD'} eq 'ident')) {
2095 print <<END
2096 <td><input type='hidden' name='IDENT_REQUIRED' value='$proxysettings{'IDENT_REQUIRED'}'></td>
2097 <td><input type='hidden' name='IDENT_TIMEOUT' value='$proxysettings{'IDENT_TIMEOUT'}'></td>
2098 <td><input type='hidden' name='IDENT_HOSTS' value='$proxysettings{'IDENT_HOSTS'}'></td>
2099 <td><input type='hidden' name='IDENT_ENABLE_ACL' value='$proxysettings{'IDENT_ENABLE_ACL'}'></td>
2100 <td><input type='hidden' name='IDENT_USER_ACL' value='$proxysettings{'IDENT_USER_ACL'}'></td>
2101 <td><input type='hidden' name='IDENT_ALLOW_USERS' value='$proxysettings{'IDENT_ALLOW_USERS'}'></td>
2102 <td><input type='hidden' name='IDENT_DENY_USERS' value='$proxysettings{'IDENT_DENY_USERS'}'></td>
2103 END
2104 ; }
2105
2106 if (!($proxysettings{'AUTH_METHOD'} eq 'ldap')) {
2107 print <<END
2108 <td><input type='hidden' name='LDAP_BASEDN' value='$proxysettings{'LDAP_BASEDN'}'></td>
2109 <td><input type='hidden' name='LDAP_TYPE' value='$proxysettings{'LDAP_TYPE'}'></td>
2110 <td><input type='hidden' name='LDAP_SERVER' value='$proxysettings{'LDAP_SERVER'}'></td>
2111 <td><input type='hidden' name='LDAP_PORT' value='$proxysettings{'LDAP_PORT'}'></td>
2112 <td><input type='hidden' name='LDAP_BINDDN_USER' value='$proxysettings{'LDAP_BINDDN_USER'}'></td>
2113 <td><input type='hidden' name='LDAP_BINDDN_PASS' value='$proxysettings{'LDAP_BINDDN_PASS'}'></td>
2114 <td><input type='hidden' name='LDAP_GROUP' value='$proxysettings{'LDAP_GROUP'}'></td>
2115 END
2116 ; }
2117
2118 if (!($proxysettings{'AUTH_METHOD'} eq 'radius')) {
2119 print <<END
2120 <td><input type='hidden' name='RADIUS_SERVER' value='$proxysettings{'RADIUS_SERVER'}'></td>
2121 <td><input type='hidden' name='RADIUS_PORT' value='$proxysettings{'RADIUS_PORT'}'></td>
2122 <td><input type='hidden' name='RADIUS_IDENTIFIER' value='$proxysettings{'RADIUS_IDENTIFIER'}'></td>
2123 <td><input type='hidden' name='RADIUS_SECRET' value='$proxysettings{'RADIUS_SECRET'}'></td>
2124 <td><input type='hidden' name='RADIUS_ENABLE_ACL' value='$proxysettings{'RADIUS_ENABLE_ACL'}'></td>
2125 <td><input type='hidden' name='RADIUS_USER_ACL' value='$proxysettings{'RADIUS_USER_ACL'}'></td>
2126 <td><input type='hidden' name='RADIUS_ALLOW_USERS' value='$proxysettings{'RADIUS_ALLOW_USERS'}'></td>
2127 <td><input type='hidden' name='RADIUS_DENY_USERS' value='$proxysettings{'RADIUS_DENY_USERS'}'></td>
2128 END
2129 ; }
2130
2131 print "</table>\n";
2132
2133 print <<END
2134 <hr size='1'>
2135 END
2136 ;
2137
2138 print <<END
2139 <table width='100%'>
2140 <tr>
2141 <td>&nbsp;</td>
2142 <td align='center'><input type='submit' name='ACTION' value='$Lang::tr{'save'}' /></td>
2143 <td align='center'><input type='submit' name='ACTION' value='$Lang::tr{'proxy reconfigure'}' /></td>
2144 <td align='center'><input type='submit' name='ACTION' value='$Lang::tr{'advproxy save and restart'}' /></td>
2145 <td align='center'><input type='submit' name='ACTION' value='$Lang::tr{'advproxy clear cache'}' /></td>
2146 <td>&nbsp;</td>
2147 </tr>
2148
2149 </table>
2150 <br />
2151 <table width='100%'>
2152 <tr>
2153 <td><img src='/blob.gif' align='top' alt='*' />&nbsp;<font class='base'>$Lang::tr{'required field'}</font></td>
2154 <td align='right'>&nbsp;</td>
2155 </tr>
2156 </table>
2157 </form>
2158 END
2159 ;
2160
2161 &Header::closebox();
2162
2163 } else {
2164
2165 # ===================================================================
2166 # NCSA user management
2167 # ===================================================================
2168
2169 &Header::openbox('100%', 'left', "$Lang::tr{'advproxy NCSA auth'}");
2170 print <<END
2171 <form method='post' action='$ENV{'SCRIPT_NAME'}'>
2172 <table width='100%'>
2173 <tr>
2174 <td colspan='4'><b>$Lang::tr{'advproxy NCSA user management'}</b></td>
2175 </tr>
2176 <tr>
2177 <td width='25%' class='base'>$Lang::tr{'advproxy NCSA username'}:</td>
2178 <td width='25%'><input type='text' name='NCSA_USERNAME' value='$proxysettings{'NCSA_USERNAME'}' size='12'
2179 END
2180 ;
2181 if ($proxysettings{'ACTION'} eq $Lang::tr{'edit'}) { print " readonly='readonly' "; }
2182 print <<END
2183 /></td>
2184 <td width='25%' class='base'>$Lang::tr{'advproxy NCSA group'}:</td>
2185 <td class='base'>
2186 <select name='NCSA_GROUP'>
2187 <option value='standard' $selected{'NCSA_GROUP'}{'standard'}>$Lang::tr{'advproxy NCSA grp standard'}</option>
2188 <option value='extended' $selected{'NCSA_GROUP'}{'extended'}>$Lang::tr{'advproxy NCSA grp extended'}</option>
2189 <option value='disabled' $selected{'NCSA_GROUP'}{'disabled'}>$Lang::tr{'advproxy NCSA grp disabled'}</option>
2190 </select>
2191 </td>
2192
2193 </tr>
2194 <tr>
2195 <td class='base'>$Lang::tr{'advproxy NCSA password'}:</td>
2196 <td><input type='password' name='NCSA_PASS' value='$proxysettings{'NCSA_PASS'}' size='14' /></td>
2197 <td class='base'>$Lang::tr{'advproxy NCSA password confirm'}:</td>
2198 <td><input type='password' name='NCSA_PASS_CONFIRM' value='$proxysettings{'NCSA_PASS_CONFIRM'}' size='14' /></td>
2199 </tr>
2200 </table>
2201 <br>
2202 <table>
2203 <tr>
2204 <td>&nbsp;</td>
2205 <td><input type='submit' name='SUBMIT' value='$ncsa_buttontext' /></td>
2206 <td><input type='hidden' name='ACTION' value='$Lang::tr{'add'}' /></td>
2207 <td><input type='hidden' name='NCSA_MIN_PASS_LEN' value='$proxysettings{'NCSA_MIN_PASS_LEN'}'></td>
2208 END
2209 ;
2210 if ($proxysettings{'ACTION'} eq $Lang::tr{'edit'}) {
2211 print "<td><input type='reset' name='ACTION' value='$Lang::tr{'advproxy reset'}' /></td>\n";
2212 }
2213
2214 print <<END
2215 <td>&nbsp;</td>
2216 <td>&nbsp;</td>
2217 <td><input type='button' name='return2main' value='$Lang::tr{'advproxy back to main page'}' onClick='self.location.href="$ENV{'SCRIPT_NAME'}"'></td>
2218 </tr>
2219 </table>
2220 </form>
2221 <hr size='1'>
2222 <table width='100%'>
2223 <tr>
2224 <td><b>$Lang::tr{'advproxy NCSA user accounts'}:</b></td>
2225 </tr>
2226 </table>
2227 <table width='100%' align='center'>
2228 END
2229 ;
2230
2231 if (-e $extgrp)
2232 {
2233 open(FILE, $extgrp); @grouplist = <FILE>; close(FILE);
2234 foreach $user (@grouplist) { chomp($user); push(@userlist,$user.":extended"); }
2235 }
2236 if (-e $stdgrp)
2237 {
2238 open(FILE, $stdgrp); @grouplist = <FILE>; close(FILE);
2239 foreach $user (@grouplist) { chomp($user); push(@userlist,$user.":standard"); }
2240 }
2241 if (-e $disgrp)
2242 {
2243 open(FILE, $disgrp); @grouplist = <FILE>; close(FILE);
2244 foreach $user (@grouplist) { chomp($user); push(@userlist,$user.":disabled"); }
2245 }
2246
2247 @userlist = sort(@userlist);
2248
2249 # If the password file contains entries, print entries and action icons
2250
2251 if ( ! -z "$userdb" ) {
2252 print <<END
2253 <tr>
2254 <td width='30%' class='boldbase' align='center'><b><i>$Lang::tr{'advproxy NCSA username'}</i></b></td>
2255 <td width='30%' class='boldbase' align='center'><b><i>$Lang::tr{'advproxy NCSA group membership'}</i></b></td>
2256 <td class='boldbase' colspan='2' align='center'>&nbsp;</td>
2257 </tr>
2258 END
2259 ;
2260 $id = 0;
2261 foreach $line (@userlist)
2262 {
2263 $id++;
2264 chomp($line);
2265 @temp = split(/:/,$line);
2266 if($proxysettings{'ACTION'} eq $Lang::tr{'edit'} && $proxysettings{'ID'} eq $line) {
2267 print "<tr bgcolor='$Header::colouryellow'>\n"; }
2268 elsif ($id % 2) {
2269 print "<tr bgcolor='$color{'color20'}'>\n"; }
2270 else {
2271 print "<tr bgcolor='$color{'color22'}'>\n"; }
2272
2273 print <<END
2274 <td align='center'>$temp[0]</td>
2275 <td align='center'>
2276 END
2277 ;
2278 if ($temp[1] eq 'standard') {
2279 print $Lang::tr{'advproxy NCSA grp standard'};
2280 } elsif ($temp[1] eq 'extended') {
2281 print $Lang::tr{'advproxy NCSA grp extended'};
2282 } elsif ($temp[1] eq 'disabled') {
2283 print $Lang::tr{'advproxy NCSA grp disabled'}; }
2284 print <<END
2285 </td>
2286 <td width='8%' align='center'>
2287 <form method='post' name='frma$id' action='$ENV{'SCRIPT_NAME'}'>
2288 <input type='image' name='$Lang::tr{'edit'}' src='/images/edit.gif' title='$Lang::tr{'edit'}' alt='$Lang::tr{'edit'}' />
2289 <input type='hidden' name='ID' value='$line' />
2290 <input type='hidden' name='ACTION' value='$Lang::tr{'edit'}' />
2291 </form>
2292 </td>
2293
2294 <td width='8%' align='center'>
2295 <form method='post' name='frmb$id' action='$ENV{'SCRIPT_NAME'}'>
2296 <input type='image' name='$Lang::tr{'remove'}' src='/images/delete.gif' title='$Lang::tr{'remove'}' alt='$Lang::tr{'remove'}' />
2297 <input type='hidden' name='ID' value='$temp[0]' />
2298 <input type='hidden' name='ACTION' value='$Lang::tr{'remove'}' />
2299 </form>
2300 </td>
2301 </tr>
2302 END
2303 ;
2304 }
2305
2306 print <<END
2307 </table>
2308 <br>
2309 <table>
2310 <tr>
2311 <td class='boldbase'>&nbsp; <b>$Lang::tr{'legend'}:</b></td>
2312 <td>&nbsp; &nbsp; <img src='/images/edit.gif' alt='$Lang::tr{'edit'}' /></td>
2313 <td class='base'>$Lang::tr{'edit'}</td>
2314 <td>&nbsp; &nbsp; <img src='/images/delete.gif' alt='$Lang::tr{'remove'}' /></td>
2315 <td class='base'>$Lang::tr{'remove'}</td>
2316 </tr>
2317 END
2318 ;
2319 } else {
2320 print <<END
2321 <tr>
2322 <td><i>$Lang::tr{'advproxy NCSA no accounts'}</i></td>
2323 </tr>
2324 END
2325 ;
2326 }
2327
2328 print <<END
2329 </table>
2330 END
2331 ;
2332
2333 &Header::closebox();
2334
2335 }
2336
2337 # ===================================================================
2338
2339 &Header::closebigbox();
2340
2341 &Header::closepage();
2342
2343 # -------------------------------------------------------------------
2344
2345 sub read_acls
2346 {
2347 if (-e "$acl_src_subnets") {
2348 open(FILE,"$acl_src_subnets");
2349 delete $proxysettings{'SRC_SUBNETS'};
2350 while (<FILE>) { $proxysettings{'SRC_SUBNETS'} .= $_ };
2351 close(FILE);
2352 }
2353 if (-e "$acl_src_banned_ip") {
2354 open(FILE,"$acl_src_banned_ip");
2355 delete $proxysettings{'SRC_BANNED_IP'};
2356 while (<FILE>) { $proxysettings{'SRC_BANNED_IP'} .= $_ };
2357 close(FILE);
2358 }
2359 if (-e "$acl_src_banned_mac") {
2360 open(FILE,"$acl_src_banned_mac");
2361 delete $proxysettings{'SRC_BANNED_MAC'};
2362 while (<FILE>) { $proxysettings{'SRC_BANNED_MAC'} .= $_ };
2363 close(FILE);
2364 }
2365 if (-e "$acl_src_unrestricted_ip") {
2366 open(FILE,"$acl_src_unrestricted_ip");
2367 delete $proxysettings{'SRC_UNRESTRICTED_IP'};
2368 while (<FILE>) { $proxysettings{'SRC_UNRESTRICTED_IP'} .= $_ };
2369 close(FILE);
2370 }
2371 if (-e "$acl_src_unrestricted_mac") {
2372 open(FILE,"$acl_src_unrestricted_mac");
2373 delete $proxysettings{'SRC_UNRESTRICTED_MAC'};
2374 while (<FILE>) { $proxysettings{'SRC_UNRESTRICTED_MAC'} .= $_ };
2375 close(FILE);
2376 }
2377 if (-e "$acl_dst_nocache") {
2378 open(FILE,"$acl_dst_nocache");
2379 delete $proxysettings{'DST_NOCACHE'};
2380 while (<FILE>) { $proxysettings{'DST_NOCACHE'} .= $_ };
2381 close(FILE);
2382 }
2383 if (-e "$acl_dst_noauth") {
2384 open(FILE,"$acl_dst_noauth");
2385 delete $proxysettings{'DST_NOAUTH'};
2386 while (<FILE>) { $proxysettings{'DST_NOAUTH'} .= $_ };
2387 close(FILE);
2388 }
2389 if (-e "$acl_dst_noproxy_ip") {
2390 open(FILE,"$acl_dst_noproxy_ip");
2391 delete $proxysettings{'DST_NOPROXY_IP'};
2392 while (<FILE>) { $proxysettings{'DST_NOPROXY_IP'} .= $_ };
2393 close(FILE);
2394 }
2395 if (-e "$acl_dst_noproxy_url") {
2396 open(FILE,"$acl_dst_noproxy_url");
2397 delete $proxysettings{'DST_NOPROXY_URL'};
2398 while (<FILE>) { $proxysettings{'DST_NOPROXY_URL'} .= $_ };
2399 close(FILE);
2400 }
2401 if (-e "$acl_ports_safe") {
2402 open(FILE,"$acl_ports_safe");
2403 delete $proxysettings{'PORTS_SAFE'};
2404 while (<FILE>) { $proxysettings{'PORTS_SAFE'} .= $_ };
2405 close(FILE);
2406 }
2407 if (-e "$acl_ports_ssl") {
2408 open(FILE,"$acl_ports_ssl");
2409 delete $proxysettings{'PORTS_SSL'};
2410 while (<FILE>) { $proxysettings{'PORTS_SSL'} .= $_ };
2411 close(FILE);
2412 }
2413 if (-e "$mimetypes") {
2414 open(FILE,"$mimetypes");
2415 delete $proxysettings{'MIME_TYPES'};
2416 while (<FILE>) { $proxysettings{'MIME_TYPES'} .= $_ };
2417 close(FILE);
2418 }
2419 if (-e "$raddir/radauth.allowusers") {
2420 open(FILE,"$raddir/radauth.allowusers");
2421 delete $proxysettings{'RADIUS_ALLOW_USERS'};
2422 while (<FILE>) { $proxysettings{'RADIUS_ALLOW_USERS'} .= $_ };
2423 close(FILE);
2424 }
2425 if (-e "$raddir/radauth.denyusers") {
2426 open(FILE,"$raddir/radauth.denyusers");
2427 delete $proxysettings{'RADIUS_DENY_USERS'};
2428 while (<FILE>) { $proxysettings{'RADIUS_DENY_USERS'} .= $_ };
2429 close(FILE);
2430 }
2431 if (-e "$identdir/identauth.allowusers") {
2432 open(FILE,"$identdir/identauth.allowusers");
2433 delete $proxysettings{'IDENT_ALLOW_USERS'};
2434 while (<FILE>) { $proxysettings{'IDENT_ALLOW_USERS'} .= $_ };
2435 close(FILE);
2436 }
2437 if (-e "$identdir/identauth.denyusers") {
2438 open(FILE,"$identdir/identauth.denyusers");
2439 delete $proxysettings{'IDENT_DENY_USERS'};
2440 while (<FILE>) { $proxysettings{'IDENT_DENY_USERS'} .= $_ };
2441 close(FILE);
2442 }
2443 if (-e "$identhosts") {
2444 open(FILE,"$identhosts");
2445 delete $proxysettings{'IDENT_HOSTS'};
2446 while (<FILE>) { $proxysettings{'IDENT_HOSTS'} .= $_ };
2447 close(FILE);
2448 }
2449 if (-e "$cre_groups") {
2450 open(FILE,"$cre_groups");
2451 delete $proxysettings{'CRE_GROUPS'};
2452 while (<FILE>) { $proxysettings{'CRE_GROUPS'} .= $_ };
2453 close(FILE);
2454 }
2455 if (-e "$cre_svhosts") {
2456 open(FILE,"$cre_svhosts");
2457 delete $proxysettings{'CRE_SVHOSTS'};
2458 while (<FILE>) { $proxysettings{'CRE_SVHOSTS'} .= $_ };
2459 close(FILE);
2460 }
2461 }
2462
2463 # -------------------------------------------------------------------
2464
2465 sub check_acls
2466 {
2467 @temp = split(/\n/,$proxysettings{'PORTS_SAFE'});
2468 undef $proxysettings{'PORTS_SAFE'};
2469 foreach (@temp)
2470 {
2471 s/^\s+//g; s/\s+$//g;
2472 if ($_)
2473 {
2474 $line = $_;
2475 if (/^[^#]+\s+#\sSquids\sport/) { s/(^[^#]+)(\s+#\sSquids\sport)/$proxysettings{'PROXY_PORT'}\2/; $line=$_; }
2476 s/#.*//g; s/\s+//g;
2477 if (/.*-.*-.*/) { $errormessage = $Lang::tr{'advproxy errmsg invalid destination port'}; }
2478 @templist = split(/-/);
2479 foreach (@templist) { unless (&General::validport($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid destination port'}; } }
2480 $proxysettings{'PORTS_SAFE'} .= $line."\n";
2481 }
2482 }
2483
2484 @temp = split(/\n/,$proxysettings{'PORTS_SSL'});
2485 undef $proxysettings{'PORTS_SSL'};
2486 foreach (@temp)
2487 {
2488 s/^\s+//g; s/\s+$//g;
2489 if ($_)
2490 {
2491 $line = $_;
2492 s/#.*//g; s/\s+//g;
2493 if (/.*-.*-.*/) { $errormessage = $Lang::tr{'advproxy errmsg invalid destination port'}; }
2494 @templist = split(/-/);
2495 foreach (@templist) { unless (&General::validport($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid destination port'}; } }
2496 $proxysettings{'PORTS_SSL'} .= $line."\n";
2497 }
2498 }
2499
2500 @temp = split(/\n/,$proxysettings{'DST_NOCACHE'});
2501 undef $proxysettings{'DST_NOCACHE'};
2502 foreach (@temp)
2503 {
2504 s/^\s+//g;
2505 unless (/^#/) { s/\s+//g; }
2506 if ($_)
2507 {
2508 if (/^\./) { $_ = '*'.$_; }
2509 $proxysettings{'DST_NOCACHE'} .= $_."\n";
2510 }
2511 }
2512
2513 @temp = split(/\n/,$proxysettings{'SRC_SUBNETS'});
2514 undef $proxysettings{'SRC_SUBNETS'};
2515 foreach (@temp)
2516 {
2517 s/^\s+//g; s/\s+$//g;
2518 if ($_)
2519 {
2520 unless (&Network::check_subnet($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid ip or mask'} . ": $_"; }
2521 $proxysettings{'SRC_SUBNETS'} .= $_."\n";
2522 }
2523 }
2524
2525 @temp = split(/\n/,$proxysettings{'SRC_BANNED_IP'});
2526 undef $proxysettings{'SRC_BANNED_IP'};
2527 foreach (@temp)
2528 {
2529 s/^\s+//g; s/\s+$//g;
2530 if ($_)
2531 {
2532 unless (&General::validipormask($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid ip or mask'}; }
2533 $proxysettings{'SRC_BANNED_IP'} .= $_."\n";
2534 }
2535 }
2536
2537 @temp = split(/\n/,$proxysettings{'SRC_BANNED_MAC'});
2538 undef $proxysettings{'SRC_BANNED_MAC'};
2539 foreach (@temp)
2540 {
2541 s/^\s+//g; s/\s+$//g; s/-/:/g;
2542 if ($_)
2543 {
2544 unless (&General::validmac($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid mac'}; }
2545 $proxysettings{'SRC_BANNED_MAC'} .= $_."\n";
2546 }
2547 }
2548
2549 @temp = split(/\n/,$proxysettings{'SRC_UNRESTRICTED_IP'});
2550 undef $proxysettings{'SRC_UNRESTRICTED_IP'};
2551 foreach (@temp)
2552 {
2553 s/^\s+//g; s/\s+$//g;
2554 if ($_)
2555 {
2556 unless (&General::validipormask($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid ip or mask'}; }
2557 $proxysettings{'SRC_UNRESTRICTED_IP'} .= $_."\n";
2558 }
2559 }
2560
2561 @temp = split(/\n/,$proxysettings{'SRC_UNRESTRICTED_MAC'});
2562 undef $proxysettings{'SRC_UNRESTRICTED_MAC'};
2563 foreach (@temp)
2564 {
2565 s/^\s+//g; s/\s+$//g; s/-/:/g;
2566 if ($_)
2567 {
2568 unless (&General::validmac($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid mac'}; }
2569 $proxysettings{'SRC_UNRESTRICTED_MAC'} .= $_."\n";
2570 }
2571 }
2572
2573 @temp = split(/\n/,$proxysettings{'DST_NOAUTH'});
2574 undef $proxysettings{'DST_NOAUTH'};
2575 foreach (@temp)
2576 {
2577 s/^\s+//g;
2578 unless (/^#/) { s/\s+//g; }
2579 if ($_)
2580 {
2581 if (/^\./) { $_ = '*'.$_; }
2582 $proxysettings{'DST_NOAUTH'} .= $_."\n";
2583 }
2584 }
2585
2586 @temp = split(/\n/,$proxysettings{'DST_NOPROXY_IP'});
2587 undef $proxysettings{'DST_NOPROXY_IP'};
2588 foreach (@temp)
2589 {
2590 s/^\s+//g; s/\s+$//g;
2591 if ($_)
2592 {
2593 unless (&General::validipormask($_)) { $errormessage = $Lang::tr{'advproxy errmsg wpad invalid ip or mask'}; }
2594 $proxysettings{'DST_NOPROXY_IP'} .= $_."\n";
2595 }
2596 }
2597
2598 @temp = split(/\n/,$proxysettings{'DST_NOPROXY_URL'});
2599 undef $proxysettings{'DST_NOPROXY_URL'};
2600 foreach (@temp)
2601 {
2602 s/^\s+//g;
2603 unless (/^#/) { s/\s+//g; }
2604 if ($_)
2605 {
2606 if (/^\./) { $_ = '*'.$_; }
2607 $proxysettings{'DST_NOPROXY_URL'} .= $_."\n";
2608 }
2609 }
2610
2611 if (($proxysettings{'NTLM_ENABLE_ACL'} eq 'on') && ($proxysettings{'NTLM_USER_ACL'} eq 'positive'))
2612 {
2613 @temp = split(/\n/,$proxysettings{'NTLM_ALLOW_USERS'});
2614 undef $proxysettings{'NTLM_ALLOW_USERS'};
2615 foreach (@temp)
2616 {
2617 s/^\s+//g; s/\s+$//g;
2618 if ($_) { $proxysettings{'NTLM_ALLOW_USERS'} .= $_."\n"; }
2619 }
2620 if ($proxysettings{'NTLM_ALLOW_USERS'} eq '') { $errormessage = $Lang::tr{'advproxy errmsg acl cannot be empty'}; }
2621 }
2622
2623 if (($proxysettings{'NTLM_ENABLE_ACL'} eq 'on') && ($proxysettings{'NTLM_USER_ACL'} eq 'negative'))
2624 {
2625 @temp = split(/\n/,$proxysettings{'NTLM_DENY_USERS'});
2626 undef $proxysettings{'NTLM_DENY_USERS'};
2627 foreach (@temp)
2628 {
2629 s/^\s+//g; s/\s+$//g;
2630 if ($_) { $proxysettings{'NTLM_DENY_USERS'} .= $_."\n"; }
2631 }
2632 if ($proxysettings{'NTLM_DENY_USERS'} eq '') { $errormessage = $Lang::tr{'advproxy errmsg acl cannot be empty'}; }
2633 }
2634
2635 if (($proxysettings{'IDENT_ENABLE_ACL'} eq 'on') && ($proxysettings{'IDENT_USER_ACL'} eq 'positive'))
2636 {
2637 @temp = split(/\n/,$proxysettings{'IDENT_ALLOW_USERS'});
2638 undef $proxysettings{'IDENT_ALLOW_USERS'};
2639 foreach (@temp)
2640 {
2641 s/^\s+//g; s/\s+$//g;
2642 if ($_) { $proxysettings{'IDENT_ALLOW_USERS'} .= $_."\n"; }
2643 }
2644 if ($proxysettings{'IDENT_ALLOW_USERS'} eq '') { $errormessage = $Lang::tr{'advproxy errmsg acl cannot be empty'}; }
2645 }
2646
2647 if (($proxysettings{'IDENT_ENABLE_ACL'} eq 'on') && ($proxysettings{'IDENT_USER_ACL'} eq 'negative'))
2648 {
2649 @temp = split(/\n/,$proxysettings{'IDENT_DENY_USERS'});
2650 undef $proxysettings{'IDENT_DENY_USERS'};
2651 foreach (@temp)
2652 {
2653 s/^\s+//g; s/\s+$//g;
2654 if ($_) { $proxysettings{'IDENT_DENY_USERS'} .= $_."\n"; }
2655 }
2656 if ($proxysettings{'IDENT_DENY_USERS'} eq '') { $errormessage = $Lang::tr{'advproxy errmsg acl cannot be empty'}; }
2657 }
2658
2659 if (($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on') && ($proxysettings{'RADIUS_USER_ACL'} eq 'positive'))
2660 {
2661 @temp = split(/\n/,$proxysettings{'RADIUS_ALLOW_USERS'});
2662 undef $proxysettings{'RADIUS_ALLOW_USERS'};
2663 foreach (@temp)
2664 {
2665 s/^\s+//g; s/\s+$//g;
2666 if ($_) { $proxysettings{'RADIUS_ALLOW_USERS'} .= $_."\n"; }
2667 }
2668 if ($proxysettings{'RADIUS_ALLOW_USERS'} eq '') { $errormessage = $Lang::tr{'advproxy errmsg acl cannot be empty'}; }
2669 }
2670
2671 if (($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on') && ($proxysettings{'RADIUS_USER_ACL'} eq 'negative'))
2672 {
2673 @temp = split(/\n/,$proxysettings{'RADIUS_DENY_USERS'});
2674 undef $proxysettings{'RADIUS_DENY_USERS'};
2675 foreach (@temp)
2676 {
2677 s/^\s+//g; s/\s+$//g;
2678 if ($_) { $proxysettings{'RADIUS_DENY_USERS'} .= $_."\n"; }
2679 }
2680 if ($proxysettings{'RADIUS_DENY_USERS'} eq '') { $errormessage = $Lang::tr{'advproxy errmsg acl cannot be empty'}; }
2681 }
2682
2683 @temp = split(/\n/,$proxysettings{'IDENT_HOSTS'});
2684 undef $proxysettings{'IDENT_HOSTS'};
2685 foreach (@temp)
2686 {
2687 s/^\s+//g; s/\s+$//g;
2688 if ($_)
2689 {
2690 unless (&General::validipormask($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid ip or mask'}; }
2691 $proxysettings{'IDENT_HOSTS'} .= $_."\n";
2692 }
2693 }
2694
2695 @temp = split(/\n/,$proxysettings{'CRE_SVHOSTS'});
2696 undef $proxysettings{'CRE_SVHOSTS'};
2697 foreach (@temp)
2698 {
2699 s/^\s+//g; s/\s+$//g;
2700 if ($_)
2701 {
2702 unless (&General::validipormask($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid ip or mask'}; }
2703 $proxysettings{'CRE_SVHOSTS'} .= $_."\n";
2704 }
2705 }
2706 }
2707
2708 # -------------------------------------------------------------------
2709
2710 sub write_acls
2711 {
2712 open(FILE, ">$acl_src_subnets");
2713 flock(FILE, 2);
2714 if (!$proxysettings{'SRC_SUBNETS'})
2715 {
2716 if (&Header::green_used()) {
2717 print FILE "$green_cidr\n";
2718 }
2719
2720 if (&Header::blue_used()) {
2721 print FILE "$blue_cidr\n";
2722 }
2723 } else { print FILE $proxysettings{'SRC_SUBNETS'}; }
2724 close(FILE);
2725
2726 open(FILE, ">$acl_src_banned_ip");
2727 flock(FILE, 2);
2728 print FILE $proxysettings{'SRC_BANNED_IP'};
2729 close(FILE);
2730
2731 open(FILE, ">$acl_src_banned_mac");
2732 flock(FILE, 2);
2733 print FILE $proxysettings{'SRC_BANNED_MAC'};
2734 close(FILE);
2735
2736 open(FILE, ">$acl_src_unrestricted_ip");
2737 flock(FILE, 2);
2738 print FILE $proxysettings{'SRC_UNRESTRICTED_IP'};
2739 close(FILE);
2740
2741 open(FILE, ">$acl_src_unrestricted_mac");
2742 flock(FILE, 2);
2743 print FILE $proxysettings{'SRC_UNRESTRICTED_MAC'};
2744 close(FILE);
2745
2746 open(FILE, ">$acl_dst_noauth");
2747 flock(FILE, 2);
2748 print FILE $proxysettings{'DST_NOAUTH'};
2749 close(FILE);
2750
2751 open(FILE, ">$acl_dst_noproxy_ip");
2752 flock(FILE, 2);
2753 print FILE $proxysettings{'DST_NOPROXY_IP'};
2754 close(FILE);
2755
2756 open(FILE, ">$acl_dst_noproxy_url");
2757 flock(FILE, 2);
2758 print FILE $proxysettings{'DST_NOPROXY_URL'};
2759 close(FILE);
2760
2761 open(FILE, ">$acl_dst_noauth_net");
2762 close(FILE);
2763 open(FILE, ">$acl_dst_noauth_dom");
2764 close(FILE);
2765 open(FILE, ">$acl_dst_noauth_url");
2766 close(FILE);
2767
2768 @temp = split(/\n/,$proxysettings{'DST_NOAUTH'});
2769 foreach(@temp)
2770 {
2771 unless (/^#/)
2772 {
2773 if (/^\*\.\w/)
2774 {
2775 s/^\*//;
2776 open(FILE, ">>$acl_dst_noauth_dom");
2777 flock(FILE, 2);
2778 print FILE "$_\n";
2779 close(FILE);
2780 }
2781 elsif (&General::validipormask($_))
2782 {
2783 open(FILE, ">>$acl_dst_noauth_net");
2784 flock(FILE, 2);
2785 print FILE "$_\n";
2786 close(FILE);
2787 }
2788 elsif (/\d\d?\d?\.\d\d?\d?\.\d\d?\d?\.\d\d?\d?-\d\d?\d?\.\d\d?\d?\.\d\d?\d?\.\d\d?\d?/)
2789 {
2790 open(FILE, ">>$acl_dst_noauth_net");
2791 flock(FILE, 2);
2792 print FILE "$_\n";
2793 close(FILE);
2794 }
2795 else
2796 {
2797 open(FILE, ">>$acl_dst_noauth_url");
2798 flock(FILE, 2);
2799 if (/^[fh]tt?ps?:\/\//) { print FILE "$_\n"; } else { print FILE "^[fh]tt?ps?://$_\n"; }
2800 close(FILE);
2801 }
2802 }
2803 }
2804
2805 open(FILE, ">$acl_dst_nocache");
2806 flock(FILE, 2);
2807 print FILE $proxysettings{'DST_NOCACHE'};
2808 close(FILE);
2809
2810 open(FILE, ">$acl_dst_nocache_net");
2811 close(FILE);
2812 open(FILE, ">$acl_dst_nocache_dom");
2813 close(FILE);
2814 open(FILE, ">$acl_dst_nocache_url");
2815 close(FILE);
2816
2817 @temp = split(/\n/,$proxysettings{'DST_NOCACHE'});
2818 foreach(@temp)
2819 {
2820 unless (/^#/)
2821 {
2822 if (/^\*\.\w/)
2823 {
2824 s/^\*//;
2825 open(FILE, ">>$acl_dst_nocache_dom");
2826 flock(FILE, 2);
2827 print FILE "$_\n";
2828 close(FILE);
2829 }
2830 elsif (&General::validipormask($_))
2831 {
2832 open(FILE, ">>$acl_dst_nocache_net");
2833 flock(FILE, 2);
2834 print FILE "$_\n";
2835 close(FILE);
2836 }
2837 elsif (/\d\d?\d?\.\d\d?\d?\.\d\d?\d?\.\d\d?\d?-\d\d?\d?\.\d\d?\d?\.\d\d?\d?\.\d\d?\d?/)
2838 {
2839 open(FILE, ">>$acl_dst_nocache_net");
2840 flock(FILE, 2);
2841 print FILE "$_\n";
2842 close(FILE);
2843 }
2844 else
2845 {
2846 open(FILE, ">>$acl_dst_nocache_url");
2847 flock(FILE, 2);
2848 if (/^[fh]tt?ps?:\/\//) { print FILE "$_\n"; } else { print FILE "^[fh]tt?ps?://$_\n"; }
2849 close(FILE);
2850 }
2851 }
2852 }
2853
2854 open(FILE, ">$acl_ports_safe");
2855 flock(FILE, 2);
2856 if (!$proxysettings{'PORTS_SAFE'}) { print FILE $def_ports_safe; } else { print FILE $proxysettings{'PORTS_SAFE'}; }
2857 close(FILE);
2858
2859 open(FILE, ">$acl_ports_ssl");
2860 flock(FILE, 2);
2861 if (!$proxysettings{'PORTS_SSL'}) { print FILE $def_ports_ssl; } else { print FILE $proxysettings{'PORTS_SSL'}; }
2862 close(FILE);
2863
2864 if (-s $throttled_urls)
2865 {
2866 open(URLFILE, $throttled_urls);
2867 @temp = <URLFILE>;
2868 close(URLFILE);
2869 foreach (@temp) { print FILE; }
2870 }
2871 close(FILE);
2872
2873 open(FILE, ">$mimetypes");
2874 flock(FILE, 2);
2875 print FILE $proxysettings{'MIME_TYPES'};
2876 close(FILE);
2877
2878 open(FILE, ">$raddir/radauth.allowusers");
2879 flock(FILE, 2);
2880 print FILE $proxysettings{'RADIUS_ALLOW_USERS'};
2881 close(FILE);
2882
2883 open(FILE, ">$raddir/radauth.denyusers");
2884 flock(FILE, 2);
2885 print FILE $proxysettings{'RADIUS_DENY_USERS'};
2886 close(FILE);
2887
2888 open(FILE, ">$identdir/identauth.allowusers");
2889 flock(FILE, 2);
2890 print FILE $proxysettings{'IDENT_ALLOW_USERS'};
2891 close(FILE);
2892
2893 open(FILE, ">$identdir/identauth.denyusers");
2894 flock(FILE, 2);
2895 print FILE $proxysettings{'IDENT_DENY_USERS'};
2896 close(FILE);
2897
2898 open(FILE, ">$identhosts");
2899 flock(FILE, 2);
2900 print FILE $proxysettings{'IDENT_HOSTS'};
2901 close(FILE);
2902
2903 open(FILE, ">$cre_groups");
2904 flock(FILE, 2);
2905 print FILE $proxysettings{'CRE_GROUPS'};
2906 close(FILE);
2907
2908 open(FILE, ">$cre_svhosts");
2909 flock(FILE, 2);
2910 print FILE $proxysettings{'CRE_SVHOSTS'};
2911 close(FILE);
2912 }
2913
2914 # -------------------------------------------------------------------
2915
2916 sub writepacfile
2917 {
2918 my %vpnconfig=();
2919 my %ovpnconfig=();
2920 &General::readhasharray("${General::swroot}/vpn/config", \%vpnconfig);
2921 &General::readhasharray("${General::swroot}/ovpn/ovpnconfig", \%ovpnconfig);
2922 open(FILE, ">/srv/web/ipfire/html/proxy.pac");
2923 flock(FILE, 2);
2924 print FILE "function FindProxyForURL(url, host)\n";
2925 print FILE "{\n";
2926 if (($proxysettings{'ENABLE'} eq 'on') || ($proxysettings{'ENABLE_BLUE'} eq 'on'))
2927 {
2928 print FILE <<END
2929 if (
2930 (isPlainHostName(host)) ||
2931 (isInNet(host, "127.0.0.1", "255.0.0.0")) ||
2932 END
2933 ;
2934
2935 if ($netsettings{'GREEN_DEV'}) {
2936 print FILE " (isInNet(host, \"$netsettings{'GREEN_NETADDRESS'}\", \"$netsettings{'GREEN_NETMASK'}\")) ||\n";
2937 }
2938
2939 if (&Header::blue_used() && $netsettings{'BLUE_DEV'}) {
2940 print FILE " (isInNet(host, \"$netsettings{'BLUE_NETADDRESS'}\", \"$netsettings{'BLUE_NETMASK'}\")) ||\n";
2941 }
2942
2943 if (&Header::orange_used() && $netsettings{'ORANGE_DEV'}) {
2944 print FILE " (isInNet(host, \"$netsettings{'ORANGE_NETADDRESS'}\", \"$netsettings{'ORANGE_NETMASK'}\")) ||\n";
2945 }
2946
2947 # Additional exceptions for URLs
2948 # The file has to be created by the user and should contain one entry per line
2949 # Line-Format: <URL incl. wildcards>
2950 # e.g. *.ipfire.org*
2951 if (-s "$acl_dst_noproxy_url") {
2952 undef @templist;
2953
2954 open(NOPROXY,"$acl_dst_noproxy_url");
2955 @templist = <NOPROXY>;
2956 close(NOPROXY);
2957 chomp (@templist);
2958
2959 foreach (@templist)
2960 {
2961 print FILE " (shExpMatch(url, \"$_\")) ||\n";
2962 }
2963 }
2964
2965 # Additional exceptions for Subnets
2966 # The file has to be created by the user and should contain one entry per line
2967 # Line-Format: <IP>/<SUBNET MASK>
2968 # e.g. 192.168.0.0/255.255.255.0
2969 if (-s "$acl_dst_noproxy_ip") {
2970 undef @templist;
2971
2972 open(NOPROXY,"$acl_dst_noproxy_ip");
2973 @templist = <NOPROXY>;
2974 close(NOPROXY);
2975 chomp (@templist);
2976
2977 foreach (@templist)
2978 {
2979 @temp = split(/\//);
2980 print FILE " (isInNet(host, \"$temp[0]\", \"$temp[1]\")) ||\n";
2981 }
2982 }
2983
2984 foreach my $key (sort { uc($vpnconfig{$a}[1]) cmp uc($vpnconfig{$b}[1]) } keys %vpnconfig) {
2985 if ($vpnconfig{$key}[0] eq 'on' && $vpnconfig{$key}[3] ne 'host') {
2986 my @networks = split(/\|/, $vpnconfig{$key}[11]);
2987 foreach my $network (@networks) {
2988 my ($vpnip, $vpnsub) = split("/", $network);
2989 $vpnsub = &Network::convert_prefix2netmask($vpnsub) || $vpnsub;
2990 print FILE " (isInNet(host, \"$vpnip\", \"$vpnsub\")) ||\n";
2991 }
2992 }
2993 }
2994
2995 foreach my $key (sort { uc($ovpnconfig{$a}[1]) cmp uc($ovpnconfig{$b}[1]) } keys %ovpnconfig) {
2996 if ($ovpnconfig{$key}[0] eq 'on' && $ovpnconfig{$key}[3] ne 'host') {
2997 my @networks = split(/\|/, $ovpnconfig{$key}[11]);
2998 foreach my $network (@networks) {
2999 my ($vpnip, $vpnsub) = split("/", $network);
3000 print FILE " (isInNet(host, \"$vpnip\", \"$vpnsub\")) ||\n";
3001 }
3002 }
3003 }
3004
3005 print FILE <<END
3006 (isInNet(host, "169.254.0.0", "255.255.0.0"))
3007 )
3008 return "DIRECT";
3009
3010 else
3011
3012 END
3013 ;
3014 if ($proxysettings{'ENABLE'} eq 'on')
3015 {
3016 print FILE "if (\n";
3017 print FILE " (isInNet(myIpAddress(), \"$netsettings{'GREEN_NETADDRESS'}\", \"$netsettings{'GREEN_NETMASK'}\"))";
3018
3019 undef @templist;
3020 if (-e "$acl_src_subnets") {
3021 open(SUBNETS,"$acl_src_subnets");
3022 @templist = <SUBNETS>;
3023 close(SUBNETS);
3024 }
3025
3026 foreach (@templist)
3027 {
3028 @temp = split(/\//);
3029 if (
3030 ($temp[0] ne $netsettings{'GREEN_NETADDRESS'}) && ($temp[1] ne $netsettings{'GREEN_NETMASK'}) &&
3031 ($temp[0] ne $netsettings{'BLUE_NETADDRESS'}) && ($temp[1] ne $netsettings{'BLUE_NETMASK'})
3032 )
3033 {
3034 chomp $temp[1];
3035 my $tempmask = &Network::convert_prefix2netmask($temp[1]);
3036 print FILE " ||\n (isInNet(myIpAddress(), \"$temp[0]\", \"$tempmask\"))";
3037 }
3038 }
3039
3040 print FILE "\n";
3041
3042 print FILE <<END
3043 )
3044 return "PROXY $netsettings{'GREEN_ADDRESS'}:$proxysettings{'PROXY_PORT'}";
3045 END
3046 ;
3047 }
3048 if (($proxysettings{'ENABLE'} eq 'on') && ($proxysettings{'ENABLE_BLUE'} eq 'on') && ($netsettings{'BLUE_DEV'}))
3049 {
3050 print FILE "\n else\n\n";
3051 }
3052 if (($netsettings{'BLUE_DEV'}) && ($proxysettings{'ENABLE_BLUE'} eq 'on'))
3053 {
3054 print FILE <<END
3055 if (
3056 (isInNet(myIpAddress(), "$netsettings{'BLUE_NETADDRESS'}", "$netsettings{'BLUE_NETMASK'}"))
3057 )
3058 return "PROXY $netsettings{'BLUE_ADDRESS'}:$proxysettings{'PROXY_PORT'}";
3059 END
3060 ;
3061 }
3062 }
3063 print FILE "}\n";
3064 close(FILE);
3065 }
3066
3067 # -------------------------------------------------------------------
3068
3069 sub writeconfig
3070 {
3071 my $authrealm;
3072 my $delaypools;
3073
3074 if ($proxysettings{'THROTTLING_GREEN_TOTAL'} +
3075 $proxysettings{'THROTTLING_GREEN_HOST'} +
3076 $proxysettings{'THROTTLING_BLUE_TOTAL'} +
3077 $proxysettings{'THROTTLING_BLUE_HOST'} gt 0)
3078 {
3079 $delaypools = 1; } else { $delaypools = 0;
3080 }
3081
3082 if ($proxysettings{'AUTH_REALM'} eq '')
3083 {
3084 $authrealm = "IPFire Advanced Proxy Server";
3085 } else {
3086 $authrealm = $proxysettings{'AUTH_REALM'};
3087 }
3088
3089 $_ = $proxysettings{'UPSTREAM_PROXY'};
3090 my ($remotehost, $remoteport) = split(/:/,$_);
3091
3092 if ($remoteport eq '') { $remoteport = 80; }
3093
3094 open(FILE, ">${General::swroot}/proxy/squid.conf");
3095 flock(FILE, 2);
3096 print FILE <<END
3097 # Do not modify '${General::swroot}/proxy/squid.conf' directly since any changes
3098 # you make will be overwritten whenever you resave proxy settings using the
3099 # web interface!
3100 #
3101 # Instead, modify the file '$acl_include' and
3102 # then restart the proxy service using the web interface. Changes made to the
3103 # 'include.acl' file will propagate to the 'squid.conf' file at that time.
3104
3105 shutdown_lifetime 5 seconds
3106 icp_port 0
3107 httpd_suppress_version_string on
3108
3109 END
3110 ;
3111
3112 # Include file with user defined settings.
3113 if (-e "/etc/squid/squid.conf.pre.local") {
3114 print FILE "include /etc/squid/squid.conf.pre.local\n\n";
3115 }
3116
3117 if (&Header::green_used()) {
3118 print FILE "http_port $netsettings{'GREEN_ADDRESS'}:$proxysettings{'PROXY_PORT'}";
3119 } else {
3120 print FILE "http_port 0.0.0.0:$proxysettings{'PROXY_PORT'}";
3121 }
3122 if ($proxysettings{'NO_CONNECTION_AUTH'} eq 'on') { print FILE " no-connection-auth" }
3123 print FILE "\n";
3124
3125 if (&Header::green_used() && $proxysettings{'TRANSPARENT'} eq 'on') {
3126 print FILE "http_port $netsettings{'GREEN_ADDRESS'}:$proxysettings{'TRANSPARENT_PORT'} intercept";
3127 if ($proxysettings{'NO_CONNECTION_AUTH'} eq 'on') { print FILE " no-connection-auth" }
3128 print FILE "\n";
3129 }
3130
3131 if ($netsettings{'BLUE_DEV'} && $proxysettings{'ENABLE_BLUE'} eq 'on') {
3132 print FILE "http_port $netsettings{'BLUE_ADDRESS'}:$proxysettings{'PROXY_PORT'}";
3133 if ($proxysettings{'NO_CONNECTION_AUTH'} eq 'on') { print FILE " no-connection-auth" }
3134 print FILE "\n";
3135
3136 if ($proxysettings{'TRANSPARENT_BLUE'} eq 'on') {
3137 print FILE "http_port $netsettings{'BLUE_ADDRESS'}:$proxysettings{'TRANSPARENT_PORT'} intercept";
3138 if ($proxysettings{'NO_CONNECTION_AUTH'} eq 'on') { print FILE " no-connection-auth" }
3139 print FILE "\n";
3140 }
3141 }
3142
3143 if (($proxysettings{'CACHE_SIZE'} > 0) || ($proxysettings{'CACHE_MEM'} > 0))
3144 {
3145 print FILE "\n";
3146
3147 if (!-z $acl_dst_nocache_dom) {
3148 print FILE "acl no_cache_domains dstdomain \"$acl_dst_nocache_dom\"\n";
3149 print FILE "cache deny no_cache_domains\n";
3150 }
3151 if (!-z $acl_dst_nocache_net) {
3152 print FILE "acl no_cache_ipaddr dst \"$acl_dst_nocache_net\"\n";
3153 print FILE "cache deny no_cache_ipaddr\n";
3154 }
3155 if (!-z $acl_dst_nocache_url) {
3156 print FILE "acl no_cache_hosts url_regex -i \"$acl_dst_nocache_url\"\n";
3157 print FILE "cache deny no_cache_hosts\n";
3158 }
3159 }
3160
3161 print FILE <<END
3162
3163 cache_effective_user squid
3164 umask 022
3165
3166 pid_filename /var/run/squid.pid
3167
3168 cache_mem $proxysettings{'CACHE_MEM'} MB
3169 END
3170 ;
3171 print FILE "error_directory $errordir/$proxysettings{'ERR_LANGUAGE'}\n\n";
3172
3173 if ($proxysettings{'OFFLINE_MODE'} eq 'on') { print FILE "offline_mode on\n\n"; }
3174 if ($proxysettings{'CACHE_DIGESTS'} eq 'on') { print FILE "digest_generation on\n\n"; } else { print FILE "digest_generation off\n\n"; }
3175
3176 if ((!($proxysettings{'MEM_POLICY'} eq 'LRU')) || (!($proxysettings{'CACHE_POLICY'} eq 'LRU')))
3177 {
3178 if (!($proxysettings{'MEM_POLICY'} eq 'LRU'))
3179 {
3180 print FILE "memory_replacement_policy $proxysettings{'MEM_POLICY'}\n";
3181 }
3182 if (!($proxysettings{'CACHE_POLICY'} eq 'LRU'))
3183 {
3184 print FILE "cache_replacement_policy $proxysettings{'CACHE_POLICY'}\n";
3185 }
3186 print FILE "\n";
3187 }
3188
3189 open (PORTS,"$acl_ports_ssl");
3190 my @ssl_ports = <PORTS>;
3191 close PORTS;
3192
3193 if (@ssl_ports) {
3194 foreach (@ssl_ports) {
3195 print FILE "acl SSL_ports port $_";
3196 }
3197 }
3198
3199 open (PORTS,"$acl_ports_safe");
3200 my @safe_ports = <PORTS>;
3201 close PORTS;
3202
3203 if (@safe_ports) {
3204 foreach (@safe_ports) {
3205 print FILE "acl Safe_ports port $_";
3206 }
3207 }
3208
3209 print FILE <<END;
3210 acl IPFire_ips dst 127.0.0.1
3211 acl IPFire_http port $http_port
3212 acl IPFire_https port $https_port
3213 acl IPFire_networks src "$acl_src_subnets"
3214 acl IPFire_servers dst "$acl_src_subnets"
3215 END
3216 if (&Header::green_used()) {
3217 print FILE <<END;
3218 acl IPFire_ips dst $netsettings{'GREEN_ADDRESS'}
3219 acl IPFire_green_network src $green_cidr
3220 acl IPFire_green_servers dst $green_cidr
3221 END
3222 }
3223 if ($netsettings{'BLUE_DEV'}) { print FILE "acl IPFire_blue_network src $blue_cidr\n"; }
3224 if ($netsettings{'BLUE_DEV'}) { print FILE "acl IPFire_blue_servers dst $blue_cidr\n"; }
3225 if (!-z $acl_src_banned_ip) { print FILE "acl IPFire_banned_ips src \"$acl_src_banned_ip\"\n"; }
3226 if (!-z $acl_src_banned_mac) { print FILE "acl IPFire_banned_mac arp \"$acl_src_banned_mac\"\n"; }
3227 if (!-z $acl_src_unrestricted_ip) { print FILE "acl IPFire_unrestricted_ips src \"$acl_src_unrestricted_ip\"\n"; }
3228 if (!-z $acl_src_unrestricted_mac) { print FILE "acl IPFire_unrestricted_mac arp \"$acl_src_unrestricted_mac\"\n"; }
3229 print FILE <<END
3230 acl CONNECT method CONNECT
3231 END
3232 ;
3233
3234 if ($proxysettings{'CACHE_SIZE'} > 0) {
3235 print FILE <<END
3236 maximum_object_size $proxysettings{'MAX_SIZE'} KB
3237 minimum_object_size $proxysettings{'MIN_SIZE'} KB
3238
3239 cache_dir aufs /var/log/cache $proxysettings{'CACHE_SIZE'} $proxysettings{'L1_DIRS'} 256
3240 END
3241 ;
3242 } else {
3243 if ($proxysettings{'CACHE_MEM'} > 0) {
3244 # always 2% of CACHE_MEM defined as max object size
3245 print FILE "maximum_object_size_in_memory " . int($proxysettings{'CACHE_MEM'} * 1024 * 0.02) . " KB\n\n";
3246 } else {
3247 print FILE "cache deny all\n\n";
3248 }
3249 }
3250
3251 print FILE <<END
3252 request_body_max_size $proxysettings{'MAX_OUTGOING_SIZE'} KB
3253 END
3254 ;
3255
3256 if ($proxysettings{'MAX_INCOMING_SIZE'} > 0) {
3257 if (!-z $acl_src_unrestricted_ip) { print FILE "reply_body_max_size none IPFire_unrestricted_ips\n"; }
3258 if (!-z $acl_src_unrestricted_mac) { print FILE "reply_body_max_size none IPFire_unrestricted_mac\n"; }
3259 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
3260 {
3261 if (!-z $extgrp) { print FILE "reply_body_max_size none for_extended_users\n"; }
3262 }
3263 }
3264
3265 if ( $proxysettings{'MAX_INCOMING_SIZE'} != '0' )
3266 {
3267 print FILE "reply_body_max_size $proxysettings{'MAX_INCOMING_SIZE'} KB all\n\n";
3268 }
3269
3270 if ($proxysettings{'LOGGING'} eq 'on')
3271 {
3272 print FILE <<END
3273 access_log stdio:/var/log/squid/access.log
3274 cache_log /var/log/squid/cache.log
3275 cache_store_log none
3276 END
3277 ;
3278 if ($proxysettings{'LOGUSERAGENT'} eq 'on') { print FILE "access_log stdio:\/var\/log\/squid\/user_agent.log useragent\n"; }
3279 if ($proxysettings{'LOGQUERY'} eq 'on') { print FILE "\nstrip_query_terms off\n"; }
3280 } else {
3281 print FILE <<END
3282 access_log /dev/null
3283 cache_log /dev/null
3284 cache_store_log none
3285 END
3286 ;}
3287 print FILE <<END
3288
3289 log_mime_hdrs off
3290 END
3291 ;
3292
3293 if ($proxysettings{'FORWARD_IPADDRESS'} eq 'on')
3294 {
3295 print FILE "forwarded_for on\n";
3296 } else {
3297 print FILE "forwarded_for off\n";
3298 }
3299 if ($proxysettings{'FORWARD_VIA'} eq 'on')
3300 {
3301 print FILE "via on\n";
3302 } else {
3303 print FILE "via off\n";
3304 }
3305 print FILE "\n";
3306
3307 if ((!($proxysettings{'AUTH_METHOD'} eq 'none')) && (!($proxysettings{'AUTH_METHOD'} eq 'ident')))
3308 {
3309 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
3310 {
3311 print FILE "auth_param basic program $authdir/basic_ncsa_auth $userdb\n";
3312 print FILE "auth_param basic children $proxysettings{'AUTH_CHILDREN'}\n";
3313 print FILE "auth_param basic realm $authrealm\n";
3314 print FILE "auth_param basic credentialsttl $proxysettings{'AUTH_CACHE_TTL'} minutes\n";
3315 if (!($proxysettings{'AUTH_IPCACHE_TTL'} eq '0')) { print FILE "\nauthenticate_ip_ttl $proxysettings{'AUTH_IPCACHE_TTL'} minutes\n"; }
3316 }
3317
3318 if ($proxysettings{'AUTH_METHOD'} eq 'ldap')
3319 {
3320 print FILE "auth_param basic utf8 on\n";
3321 print FILE "auth_param basic program $authdir/basic_ldap_auth -b \"$proxysettings{'LDAP_BASEDN'}\"";
3322 if (!($proxysettings{'LDAP_BINDDN_USER'} eq '')) { print FILE " -D \"$proxysettings{'LDAP_BINDDN_USER'}\""; }
3323 if (!($proxysettings{'LDAP_BINDDN_PASS'} eq '')) { print FILE " -w $proxysettings{'LDAP_BINDDN_PASS'}"; }
3324 if ($proxysettings{'LDAP_TYPE'} eq 'ADS')
3325 {
3326 if ($proxysettings{'LDAP_GROUP'} eq '')
3327 {
3328 print FILE " -f \"(\&(objectClass=person)(sAMAccountName=\%s))\"";
3329 } else {
3330 print FILE " -f \"(\&(\&(objectClass=person)(sAMAccountName=\%s))(memberOf=$proxysettings{'LDAP_GROUP'}))\"";
3331 }
3332 print FILE " -u sAMAccountName -P";
3333 }
3334 if ($proxysettings{'LDAP_TYPE'} eq 'NDS')
3335 {
3336 if ($proxysettings{'LDAP_GROUP'} eq '')
3337 {
3338 print FILE " -f \"(\&(objectClass=person)(cn=\%s))\"";
3339 } else {
3340 print FILE " -f \"(\&(\&(objectClass=person)(cn=\%s))(groupMembership=$proxysettings{'LDAP_GROUP'}))\"";
3341 }
3342 print FILE " -u cn -P";
3343 }
3344 if (($proxysettings{'LDAP_TYPE'} eq 'V2') || ($proxysettings{'LDAP_TYPE'} eq 'V3'))
3345 {
3346 if ($proxysettings{'LDAP_GROUP'} eq '')
3347 {
3348 print FILE " -f \"(\&(objectClass=person)(uid=\%s))\"";
3349 } else {
3350 print FILE " -f \"(\&(\&(objectClass=person)(uid=\%s))(memberOf=$proxysettings{'LDAP_GROUP'}))\"";
3351 }
3352 if ($proxysettings{'LDAP_TYPE'} eq 'V2') { print FILE " -v 2"; }
3353 if ($proxysettings{'LDAP_TYPE'} eq 'V3') { print FILE " -v 3"; }
3354 print FILE " -u uid -P";
3355 }
3356 print FILE " $proxysettings{'LDAP_SERVER'}:$proxysettings{'LDAP_PORT'}\n";
3357 print FILE "auth_param basic children $proxysettings{'AUTH_CHILDREN'}\n";
3358 print FILE "auth_param basic realm $authrealm\n";
3359 print FILE "auth_param basic credentialsttl $proxysettings{'AUTH_CACHE_TTL'} minutes\n";
3360 if (!($proxysettings{'AUTH_IPCACHE_TTL'} eq '0')) { print FILE "\nauthenticate_ip_ttl $proxysettings{'AUTH_IPCACHE_TTL'} minutes\n"; }
3361 }
3362
3363 if ($proxysettings{'AUTH_METHOD'} eq 'ntlm-auth')
3364 {
3365 print FILE "auth_param ntlm program /usr/bin/ntlm_auth --helper-protocol=squid-2.5-ntlmssp";
3366 if ($proxysettings{'NTLM_AUTH_GROUP'}) {
3367 my $ntlm_auth_group = $proxysettings{'NTLM_AUTH_GROUP'};
3368 $ntlm_auth_group =~ s/\\/\+/;
3369
3370 print FILE " --require-membership-of=$ntlm_auth_group";
3371 }
3372 print FILE "\n";
3373
3374 print FILE "auth_param ntlm children $proxysettings{'AUTH_CHILDREN'}\n\n";
3375 print FILE "auth_param ntlm credentialsttl $proxysettings{'AUTH_CACHE_TTL'} minutes\n\n";
3376
3377 # BASIC authentication
3378 if ($proxysettings{'NTLM_AUTH_BASIC'} eq "on") {
3379 print FILE "auth_param basic program /usr/bin/ntlm_auth --helper-protocol=squid-2.5-basic";
3380 if ($proxysettings{'NTLM_AUTH_GROUP'}) {
3381 my $ntlm_auth_group = $proxysettings{'NTLM_AUTH_GROUP'};
3382 $ntlm_auth_group =~ s/\\/\+/;
3383
3384 print FILE " --require-membership-of=$ntlm_auth_group";
3385 }
3386 print FILE "\n";
3387 print FILE "auth_param basic children $proxysettings{'AUTH_CHILDREN'}\n";
3388 print FILE "auth_param basic realm $authrealm\n";
3389 print FILE "auth_param basic credentialsttl $proxysettings{'AUTH_CACHE_TTL'} minutes\n\n";
3390 }
3391 }
3392
3393 if ($proxysettings{'AUTH_METHOD'} eq 'radius')
3394 {
3395 print FILE "auth_param basic program $authdir/basic_radius_auth -h $proxysettings{'RADIUS_SERVER'} -p $proxysettings{'RADIUS_PORT'} ";
3396 if (!($proxysettings{'RADIUS_IDENTIFIER'} eq '')) { print FILE "-i $proxysettings{'RADIUS_IDENTIFIER'} "; }
3397 print FILE "-w $proxysettings{'RADIUS_SECRET'}\n";
3398 print FILE "auth_param basic children $proxysettings{'AUTH_CHILDREN'}\n";
3399 print FILE "auth_param basic realm $authrealm\n";
3400 print FILE "auth_param basic credentialsttl $proxysettings{'AUTH_CACHE_TTL'} minutes\n";
3401 if (!($proxysettings{'AUTH_IPCACHE_TTL'} eq '0')) { print FILE "\nauthenticate_ip_ttl $proxysettings{'AUTH_IPCACHE_TTL'} minutes\n"; }
3402 }
3403
3404 print FILE "\n";
3405 print FILE "acl for_inetusers proxy_auth REQUIRED\n";
3406 if (($proxysettings{'AUTH_METHOD'} eq 'radius') && ($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on'))
3407 {
3408 if ((!-z "$raddir/radauth.allowusers") && ($proxysettings{'RADIUS_USER_ACL'} eq 'positive'))
3409 {
3410 print FILE "acl for_acl_users proxy_auth \"$raddir/radauth.allowusers\"\n";
3411 }
3412 if ((!-z "$raddir/radauth.denyusers") && ($proxysettings{'RADIUS_USER_ACL'} eq 'negative'))
3413 {
3414 print FILE "acl for_acl_users proxy_auth \"$raddir/radauth.denyusers\"\n";
3415 }
3416 }
3417 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
3418 {
3419 print FILE "\n";
3420 if (!-z $extgrp) { print FILE "acl for_extended_users proxy_auth \"$extgrp\"\n"; }
3421 if (!-z $disgrp) { print FILE "acl for_disabled_users proxy_auth \"$disgrp\"\n"; }
3422 }
3423 if (!($proxysettings{'AUTH_MAX_USERIP'} eq '')) { print FILE "\nacl concurrent max_user_ip -s $proxysettings{'AUTH_MAX_USERIP'}\n"; }
3424 print FILE "\n";
3425
3426 if (!-z $acl_dst_noauth_net) { print FILE "acl to_ipaddr_without_auth dst \"$acl_dst_noauth_net\"\n"; }
3427 if (!-z $acl_dst_noauth_dom) { print FILE "acl to_domains_without_auth dstdomain \"$acl_dst_noauth_dom\"\n"; }
3428 if (!-z $acl_dst_noauth_url) { print FILE "acl to_hosts_without_auth url_regex -i \"$acl_dst_noauth_url\"\n"; }
3429 print FILE "\n";
3430
3431 }
3432
3433 if ($proxysettings{'AUTH_METHOD'} eq 'ident')
3434 {
3435 if ($proxysettings{'IDENT_REQUIRED'} eq 'on')
3436 {
3437 print FILE "acl for_inetusers ident REQUIRED\n";
3438 }
3439 if ($proxysettings{'IDENT_ENABLE_ACL'} eq 'on')
3440 {
3441 if ((!-z "$identdir/identauth.allowusers") && ($proxysettings{'IDENT_USER_ACL'} eq 'positive'))
3442 {
3443 print FILE "acl for_acl_users ident_regex -i \"$identdir/identauth.allowusers\"\n\n";
3444 }
3445 if ((!-z "$identdir/identauth.denyusers") && ($proxysettings{'IDENT_USER_ACL'} eq 'negative'))
3446 {
3447 print FILE "acl for_acl_users ident_regex -i \"$identdir/identauth.denyusers\"\n\n";
3448 }
3449 }
3450 if (!-z $acl_dst_noauth_net) { print FILE "acl to_ipaddr_without_auth dst \"$acl_dst_noauth_net\"\n"; }
3451 if (!-z $acl_dst_noauth_dom) { print FILE "acl to_domains_without_auth dstdomain \"$acl_dst_noauth_dom\"\n"; }
3452 if (!-z $acl_dst_noauth_url) { print FILE "acl to_hosts_without_auth url_regex -i \"$acl_dst_noauth_url\"\n"; }
3453 print FILE "\n";
3454 }
3455
3456 if (($delaypools) && (!-z $acl_dst_throttle)) { print FILE "acl for_throttled_urls url_regex -i \"$acl_dst_throttle\"\n\n"; }
3457
3458 print FILE "acl within_timeframe time ";
3459 if ($proxysettings{'TIME_MON'} eq 'on') { print FILE "M"; }
3460 if ($proxysettings{'TIME_TUE'} eq 'on') { print FILE "T"; }
3461 if ($proxysettings{'TIME_WED'} eq 'on') { print FILE "W"; }
3462 if ($proxysettings{'TIME_THU'} eq 'on') { print FILE "H"; }
3463 if ($proxysettings{'TIME_FRI'} eq 'on') { print FILE "F"; }
3464 if ($proxysettings{'TIME_SAT'} eq 'on') { print FILE "A"; }
3465 if ($proxysettings{'TIME_SUN'} eq 'on') { print FILE "S"; }
3466 print FILE " $proxysettings{'TIME_FROM_HOUR'}:";
3467 print FILE "$proxysettings{'TIME_FROM_MINUTE'}-";
3468 print FILE "$proxysettings{'TIME_TO_HOUR'}:";
3469 print FILE "$proxysettings{'TIME_TO_MINUTE'}\n\n";
3470
3471 if ((!-z $mimetypes) && ($proxysettings{'ENABLE_MIME_FILTER'} eq 'on')) {
3472 print FILE "acl blocked_mimetypes rep_mime_type \"$mimetypes\"\n\n";
3473 }
3474
3475 if ($proxysettings{'CLASSROOM_EXT'} eq 'on') {
3476 print FILE <<END
3477
3478 #Classroom extensions
3479 acl IPFire_no_access_ips src "$acl_src_noaccess_ip"
3480 acl IPFire_no_access_mac arp "$acl_src_noaccess_mac"
3481 END
3482 ;
3483 print FILE "deny_info ";
3484 if (($proxysettings{'ERR_DESIGN'} eq 'squid') && (-e "$errordir/$proxysettings{'ERR_LANGUAGE'}/ERR_ACCESS_DISABLED"))
3485 {
3486 print FILE "ERR_ACCESS_DISABLED";
3487 } else {
3488 print FILE "ERR_ACCESS_DENIED";
3489 }
3490 print FILE " IPFire_no_access_ips\n";
3491 print FILE "deny_info ";
3492 if (($proxysettings{'ERR_DESIGN'} eq 'squid') && (-e "$errordir/$proxysettings{'ERR_LANGUAGE'}/ERR_ACCESS_DISABLED"))
3493 {
3494 print FILE "ERR_ACCESS_DISABLED";
3495 } else {
3496 print FILE "ERR_ACCESS_DENIED";
3497 }
3498 print FILE " IPFire_no_access_mac\n";
3499
3500 print FILE <<END
3501 http_access deny IPFire_no_access_ips
3502 http_access deny IPFire_no_access_mac
3503 END
3504 ;
3505 }
3506
3507 #Insert acl file and replace __VAR__ with correct values
3508 my $blue_net = ''; #BLUE empty by default
3509 my $blue_ip = '';
3510 if ($netsettings{'BLUE_DEV'} && $proxysettings{'ENABLE_BLUE'} eq 'on') {
3511 $blue_net = "$blue_cidr";
3512 $blue_ip = "$netsettings{'BLUE_ADDRESS'}";
3513 }
3514 if (!-z $acl_include)
3515 {
3516 open (ACL, "$acl_include");
3517 print FILE "\n#Start of custom includes\n\n";
3518 while (<ACL>) {
3519 $_ =~ s/__GREEN_IP__/$netsettings{'GREEN_ADDRESS'}/;
3520 $_ =~ s/__GREEN_NET__/$green_cidr/;
3521 $_ =~ s/__BLUE_IP__/$blue_ip/;
3522 $_ =~ s/__BLUE_NET__/$blue_net/;
3523 $_ =~ s/__PROXY_PORT__/$proxysettings{'PROXY_PORT'}/;
3524 print FILE $_;
3525 }
3526 print FILE "\n#End of custom includes\n";
3527 close (ACL);
3528 }
3529 if ((!-z $extgrp) && ($proxysettings{'AUTH_METHOD'} eq 'ncsa') && ($proxysettings{'NCSA_BYPASS_REDIR'} eq 'on')) { print FILE "\nredirector_access deny for_extended_users\n"; }
3530
3531 # Check if squidclamav is enabled.
3532 if ($proxysettings{'ENABLE_CLAMAV'} eq 'on') {
3533 print FILE "\n#Settings for squidclamav:\n";
3534 print FILE "http_port 127.0.0.1:$proxysettings{'PROXY_PORT'}\n";
3535 print FILE "acl purge method PURGE\n";
3536 print FILE "http_access deny to_localhost\n";
3537 print FILE "http_access allow localhost\n";
3538 print FILE "http_access allow purge localhost\n";
3539 print FILE "http_access deny purge\n";
3540 print FILE "url_rewrite_access deny localhost\n";
3541 }
3542 print FILE <<END;
3543
3544 #Access to squid:
3545 #local machine, no restriction
3546 http_access allow localhost
3547
3548 #GUI admin if local machine connects
3549 http_access allow IPFire_ips IPFire_networks IPFire_http
3550 http_access allow CONNECT IPFire_ips IPFire_networks IPFire_https
3551
3552 #Deny not web services
3553 END
3554
3555 if (@safe_ports) {
3556 print FILE "http_access deny !Safe_ports\n";
3557 }
3558
3559 if (@ssl_ports) {
3560 print FILE "http_access deny CONNECT !SSL_ports\n";
3561 }
3562
3563 if ((($proxysettings{'ASNBL_FASTFLUX_DETECTION'} eq 'on') && (!-z $proxysettings{'ASNBL_FASTFLUX_THRESHOLD'})) || ($proxysettings{'ASNBL_SELECANN_DETECTION'} eq 'on')) {
3564 print FILE "external_acl_type asnblhelper children-max=10 children-startup=2 ttl=86400 %DST /usr/bin/asnbl-helper.py ${General::swroot}/proxy/asnbl-helper.conf\n";
3565 print FILE "acl asnbl external asnblhelper\n";
3566
3567 # Use the user-defined URL filter whitelist (if present and populated) for the ASNBL helper as well
3568 # Necessary for destinations such as fedoraproject.org, but we do not want to maintain a dedicated
3569 # or hardcoded list for such FQDNs.
3570 if ((-e "${General::swroot}/urlfilter/blacklists/custom/allowed/domains") && (!-z "${General::swroot}/urlfilter/blacklists/custom/allowed/domains")) {
3571 print FILE "acl asnbl_whitelisted_destinations dstdomain \"${General::swroot}/urlfilter/blacklists/custom/allowed/domains\"\n";
3572 print FILE "http_access deny asnbl !asnbl_whitelisted_destinations\n\n";
3573 } else {
3574 print FILE "http_access deny asnbl\n\n";
3575 }
3576
3577 # Write ASNBL helper configuration file...
3578 open(ASNBLFILE, ">${General::swroot}/proxy/asnbl-helper.conf");
3579 flock(ASNBLFILE, 2);
3580
3581 print ASNBLFILE<<END
3582 #
3583 # This file has been automatically generated. Manual changes will be overwritten.
3584 #
3585
3586 [GENERAL]
3587 LOGLEVEL = INFO
3588 ASNDB_PATH = /var/lib/location/database.db
3589 USE_REPLYMAP = no
3590 END
3591 ;
3592
3593 print ASNBLFILE "AS_DIVERSITY_THRESHOLD = $proxysettings{'ASNBL_FASTFLUX_THRESHOLD'}\n";
3594
3595 if ($proxysettings{'ASNBL_SELECANN_DETECTION'} eq 'on') {
3596 print ASNBLFILE "BLOCK_SUSPECTED_SELECTIVE_ANNOUNCEMENTS = yes\n";
3597 } else {
3598 print ASNBLFILE "BLOCK_SUSPECTED_SELECTIVE_ANNOUNCEMENTS = no\n";
3599 }
3600
3601 if ($proxysettings{'ASNBL_FASTFLUX_DETECTION'} eq 'on') {
3602 print ASNBLFILE "BLOCK_DIVERSITY_EXCEEDING_DESTINATIONS = yes\n";
3603 } else {
3604 print ASNBLFILE "BLOCK_DIVERSITY_EXCEEDING_DESTINATIONS = no\n";
3605 }
3606
3607 print ASNBLFILE<<END
3608 TESTDATA = (10.0.0.1, 0) (127.0.0.1, 0) (fe80::1, 0)
3609 ACTIVE_ASNBLS =
3610 END
3611 ;
3612
3613 close ASNBLFILE;
3614 }
3615
3616 if ($proxysettings{'AUTH_METHOD'} eq 'ident')
3617 {
3618 print FILE "#Set ident ACLs\n";
3619 if (!-z $identhosts)
3620 {
3621 print FILE "acl on_ident_aware_hosts src \"$identhosts\"\n";
3622 print FILE "ident_lookup_access allow on_ident_aware_hosts\n";
3623 print FILE "ident_lookup_access deny all\n";
3624 } else {
3625 print FILE "ident_lookup_access allow all\n";
3626 }
3627 print FILE "ident_timeout $proxysettings{'IDENT_TIMEOUT'} seconds\n\n";
3628 }
3629
3630 if ($delaypools) {
3631 print FILE "#Set download throttling\n";
3632
3633 if ($netsettings{'BLUE_DEV'})
3634 {
3635 print FILE "delay_pools 2\n";
3636 } else {
3637 print FILE "delay_pools 1\n";
3638 }
3639
3640 print FILE "delay_class 1 3\n";
3641 if ($netsettings{'BLUE_DEV'}) { print FILE "delay_class 2 3\n"; }
3642
3643 print FILE "delay_parameters 1 ";
3644 if ($proxysettings{'THROTTLING_GREEN_TOTAL'} eq 'unlimited')
3645 {
3646 print FILE "-1/-1";
3647 } else {
3648 print FILE $proxysettings{'THROTTLING_GREEN_TOTAL'} * 125;
3649 print FILE "/";
3650 print FILE $proxysettings{'THROTTLING_GREEN_TOTAL'} * 250;
3651 }
3652
3653 print FILE " -1/-1 ";
3654 if ($proxysettings{'THROTTLING_GREEN_HOST'} eq 'unlimited')
3655 {
3656 print FILE "-1/-1";
3657 } else {
3658 print FILE $proxysettings{'THROTTLING_GREEN_HOST'} * 125;
3659 print FILE "/";
3660 print FILE $proxysettings{'THROTTLING_GREEN_HOST'} * 250;
3661 }
3662 print FILE "\n";
3663
3664 if ($netsettings{'BLUE_DEV'})
3665 {
3666 print FILE "delay_parameters 2 ";
3667 if ($proxysettings{'THROTTLING_BLUE_TOTAL'} eq 'unlimited')
3668 {
3669 print FILE "-1/-1";
3670 } else {
3671 print FILE $proxysettings{'THROTTLING_BLUE_TOTAL'} * 125;
3672 print FILE "/";
3673 print FILE $proxysettings{'THROTTLING_BLUE_TOTAL'} * 250;
3674 }
3675 print FILE " -1/-1 ";
3676 if ($proxysettings{'THROTTLING_BLUE_HOST'} eq 'unlimited')
3677 {
3678 print FILE "-1/-1";
3679 } else {
3680 print FILE $proxysettings{'THROTTLING_BLUE_HOST'} * 125;
3681 print FILE "/";
3682 print FILE $proxysettings{'THROTTLING_BLUE_HOST'} * 250;
3683 }
3684 print FILE "\n";
3685 }
3686
3687 print FILE "delay_access 1 deny IPFire_ips\n";
3688 if (!-z $acl_src_unrestricted_ip) { print FILE "delay_access 1 deny IPFire_unrestricted_ips\n"; }
3689 if (!-z $acl_src_unrestricted_mac) { print FILE "delay_access 1 deny IPFire_unrestricted_mac\n"; }
3690 if (($proxysettings{'AUTH_METHOD'} eq 'ncsa') && (!-z $extgrp)) { print FILE "delay_access 1 deny for_extended_users\n"; }
3691
3692 if ($netsettings{'BLUE_DEV'})
3693 {
3694 if (&Header::green_used()) {
3695 print FILE "delay_access 1 allow IPFire_green_network";
3696 if (!-z $acl_dst_throttle) { print FILE " for_throttled_urls"; }
3697 print FILE "\n";
3698 }
3699 print FILE "delay_access 1 deny all\n";
3700 } else {
3701 print FILE "delay_access 1 allow all";
3702 if (!-z $acl_dst_throttle) { print FILE " for_throttled_urls"; }
3703 print FILE "\n";
3704 }
3705
3706 if ($netsettings{'BLUE_DEV'})
3707 {
3708 print FILE "delay_access 2 deny IPFire_ips\n";
3709 if (!-z $acl_src_unrestricted_ip) { print FILE "delay_access 2 deny IPFire_unrestricted_ips\n"; }
3710 if (!-z $acl_src_unrestricted_mac) { print FILE "delay_access 2 deny IPFire_unrestricted_mac\n"; }
3711 if (($proxysettings{'AUTH_METHOD'} eq 'ncsa') && (!-z $extgrp)) { print FILE "delay_access 2 deny for_extended_users\n"; }
3712 print FILE "delay_access 2 allow IPFire_blue_network";
3713 if (!-z $acl_dst_throttle) { print FILE " for_throttled_urls"; }
3714 print FILE "\n";
3715 print FILE "delay_access 2 deny all\n";
3716 }
3717
3718 print FILE "delay_initial_bucket_level 100\n";
3719 print FILE "\n";
3720 }
3721
3722 if (&Header::green_used() && $proxysettings{'NO_PROXY_LOCAL'} eq 'on')
3723 {
3724 print FILE "#Prevent internal proxy access to Green except IPFire itself\n";
3725 print FILE "http_access deny IPFire_green_servers !IPFire_ips !IPFire_green_network\n\n";
3726 }
3727
3728 if ($proxysettings{'NO_PROXY_LOCAL_BLUE'} eq 'on')
3729 {
3730 print FILE "#Prevent internal proxy access from Blue except IPFire itself\n";
3731 print FILE "http_access allow IPFire_blue_network IPFire_blue_servers\n";
3732 print FILE "http_access deny IPFire_blue_network !IPFire_ips IPFire_servers\n\n";
3733 }
3734
3735 print FILE <<END
3736 #Set custom configured ACLs
3737 END
3738 ;
3739 if (!-z $acl_src_banned_ip) { print FILE "http_access deny IPFire_banned_ips\n"; }
3740 if (!-z $acl_src_banned_mac) { print FILE "http_access deny IPFire_banned_mac\n"; }
3741
3742 if ((!-z $acl_dst_noauth) && (!($proxysettings{'AUTH_METHOD'} eq 'none')))
3743 {
3744 if (!-z $acl_src_unrestricted_ip)
3745 {
3746 if (!-z $acl_dst_noauth_net) { print FILE "http_access allow IPFire_unrestricted_ips to_ipaddr_without_auth\n"; }
3747 if (!-z $acl_dst_noauth_dom) { print FILE "http_access allow IPFire_unrestricted_ips to_domains_without_auth\n"; }
3748 if (!-z $acl_dst_noauth_url) { print FILE "http_access allow IPFire_unrestricted_ips to_hosts_without_auth\n"; }
3749 }
3750 if (!-z $acl_src_unrestricted_mac)
3751 {
3752 if (!-z $acl_dst_noauth_net) { print FILE "http_access allow IPFire_unrestricted_mac to_ipaddr_without_auth\n"; }
3753 if (!-z $acl_dst_noauth_dom) { print FILE "http_access allow IPFire_unrestricted_mac to_domains_without_auth\n"; }
3754 if (!-z $acl_dst_noauth_url) { print FILE "http_access allow IPFire_unrestricted_mac to_hosts_without_auth\n"; }
3755 }
3756 if (!-z $acl_dst_noauth_net)
3757 {
3758 print FILE "http_access allow IPFire_networks";
3759 if ($proxysettings{'TIME_ACCESS_MODE'} eq 'deny') {
3760 print FILE " !within_timeframe";
3761 } else {
3762 print FILE " within_timeframe"; }
3763 print FILE " to_ipaddr_without_auth\n";
3764 }
3765 if (!-z $acl_dst_noauth_dom)
3766 {
3767 print FILE "http_access allow IPFire_networks";
3768 if ($proxysettings{'TIME_ACCESS_MODE'} eq 'deny') {
3769 print FILE " !within_timeframe";
3770 } else {
3771 print FILE " within_timeframe"; }
3772 print FILE " to_domains_without_auth\n";
3773 }
3774 if (!-z $acl_dst_noauth_url)
3775 {
3776 print FILE "http_access allow IPFire_networks";
3777 if ($proxysettings{'TIME_ACCESS_MODE'} eq 'deny') {
3778 print FILE " !within_timeframe";
3779 } else {
3780 print FILE " within_timeframe"; }
3781 print FILE " to_hosts_without_auth\n";
3782 }
3783 }
3784
3785 if (($proxysettings{'AUTH_METHOD'} eq 'ident') && ($proxysettings{'IDENT_REQUIRED'} eq 'on') && ($proxysettings{'AUTH_ALWAYS_REQUIRED'} eq 'on'))
3786 {
3787 print FILE "http_access deny !for_inetusers";
3788 if (!-z $identhosts) { print FILE " on_ident_aware_hosts"; }
3789 print FILE "\n";
3790 }
3791
3792 if (
3793 ($proxysettings{'AUTH_METHOD'} eq 'ident') &&
3794 ($proxysettings{'AUTH_ALWAYS_REQUIRED'} eq 'on') &&
3795 ($proxysettings{'IDENT_ENABLE_ACL'} eq 'on') &&
3796 ($proxysettings{'IDENT_USER_ACL'} eq 'negative') &&
3797 (!-z "$identdir/identauth.denyusers")
3798 )
3799 {
3800 print FILE "http_access deny for_acl_users";
3801 if (($proxysettings{'AUTH_METHOD'} eq 'ident') && (!-z "$identdir/hosts")) { print FILE " on_ident_aware_hosts"; }
3802 print FILE "\n";
3803 }
3804
3805 if (!-z $acl_src_unrestricted_ip)
3806 {
3807 print FILE "http_access allow IPFire_unrestricted_ips";
3808 if ($proxysettings{'AUTH_ALWAYS_REQUIRED'} eq 'on')
3809 {
3810 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
3811 {
3812 if (!-z $disgrp) { print FILE " !for_disabled_users"; } else { print FILE " for_inetusers"; }
3813 }
3814 if (($proxysettings{'AUTH_METHOD'} eq 'ldap') || ($proxysettings{'AUTH_METHOD'} eq 'radius'))
3815 {
3816 print FILE " for_inetusers";
3817 }
3818 if (($proxysettings{'AUTH_METHOD'} eq 'radius') && ($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on'))
3819 {
3820 if ($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on')
3821 {
3822 if (($proxysettings{'RADIUS_USER_ACL'} eq 'positive') && (!-z "$raddir/radauth.allowusers"))
3823 {
3824 print FILE " for_acl_users";
3825 }
3826 if (($proxysettings{'RADIUS_USER_ACL'} eq 'negative') && (!-z "$raddir/radauth.denyusers"))
3827 {
3828 print FILE " !for_acl_users";
3829 }
3830 } else { print FILE " for_inetusers"; }
3831 }
3832 }
3833 print FILE "\n";
3834 }
3835
3836 if (!-z $acl_src_unrestricted_mac)
3837 {
3838 print FILE "http_access allow IPFire_unrestricted_mac";
3839 if ($proxysettings{'AUTH_ALWAYS_REQUIRED'} eq 'on')
3840 {
3841 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
3842 {
3843 if (!-z $disgrp) { print FILE " !for_disabled_users"; } else { print FILE " for_inetusers"; }
3844 }
3845 if (($proxysettings{'AUTH_METHOD'} eq 'ldap') || ($proxysettings{'AUTH_METHOD'} eq 'radius'))
3846 {
3847 print FILE " for_inetusers";
3848 }
3849 if (($proxysettings{'AUTH_METHOD'} eq 'radius') && ($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on'))
3850 {
3851 if ($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on')
3852 {
3853 if (($proxysettings{'RADIUS_USER_ACL'} eq 'positive') && (!-z "$raddir/radauth.allowusers"))
3854 {
3855 print FILE " for_acl_users";
3856 }
3857 if (($proxysettings{'RADIUS_USER_ACL'} eq 'negative') && (!-z "$raddir/radauth.denyusers"))
3858 {
3859 print FILE " !for_acl_users";
3860 }
3861 } else { print FILE " for_inetusers"; }
3862 }
3863 }
3864 print FILE "\n";
3865 }
3866
3867 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
3868 {
3869 if (!-z $disgrp) { print FILE "http_access deny for_disabled_users\n"; }
3870 if (!-z $extgrp) { print FILE "http_access allow IPFire_networks for_extended_users\n"; }
3871 }
3872
3873 if (
3874 (
3875 ($proxysettings{'AUTH_METHOD'} eq 'radius') &&
3876 ($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on') &&
3877 ($proxysettings{'RADIUS_USER_ACL'} eq 'negative') &&
3878 (!-z "$raddir/radauth.denyusers")
3879 )
3880 ||
3881 (
3882 ($proxysettings{'AUTH_METHOD'} eq 'ident') &&
3883 ($proxysettings{'AUTH_ALWAYS_REQUIRED'} eq 'off') &&
3884 ($proxysettings{'IDENT_ENABLE_ACL'} eq 'on') &&
3885 ($proxysettings{'IDENT_USER_ACL'} eq 'negative') &&
3886 (!-z "$identdir/identauth.denyusers")
3887 )
3888 )
3889 {
3890 print FILE "http_access deny for_acl_users";
3891 if (($proxysettings{'AUTH_METHOD'} eq 'ident') && (!-z "$identdir/hosts")) { print FILE " on_ident_aware_hosts"; }
3892 print FILE "\n";
3893 }
3894
3895 if (($proxysettings{'AUTH_METHOD'} eq 'ident') && ($proxysettings{'IDENT_REQUIRED'} eq 'on') && (!-z "$identhosts"))
3896 {
3897 print FILE "http_access allow";
3898 if ($proxysettings{'TIME_ACCESS_MODE'} eq 'deny') {
3899 print FILE " !within_timeframe";
3900 } else {
3901 print FILE " within_timeframe"; }
3902 print FILE " !on_ident_aware_hosts\n";
3903 }
3904
3905 print FILE "http_access allow IPFire_networks";
3906 if (
3907 (
3908 ($proxysettings{'AUTH_METHOD'} eq 'radius') &&
3909 ($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on') &&
3910 ($proxysettings{'RADIUS_USER_ACL'} eq 'positive') &&
3911 (!-z "$raddir/radauth.allowusers")
3912 )
3913 ||
3914 (
3915 ($proxysettings{'AUTH_METHOD'} eq 'ident') &&
3916 ($proxysettings{'IDENT_REQUIRED'} eq 'on') &&
3917 ($proxysettings{'IDENT_ENABLE_ACL'} eq 'on') &&
3918 ($proxysettings{'IDENT_USER_ACL'} eq 'positive') &&
3919 (!-z "$identdir/identauth.allowusers")
3920 )
3921 )
3922 {
3923 print FILE " for_acl_users";
3924 } elsif (((!($proxysettings{'AUTH_METHOD'} eq 'none')) && (!($proxysettings{'AUTH_METHOD'} eq 'ident'))) ||
3925 (($proxysettings{'AUTH_METHOD'} eq 'ident') && ($proxysettings{'IDENT_REQUIRED'} eq 'on'))) {
3926 print FILE " for_inetusers";
3927 }
3928 if ((!($proxysettings{'AUTH_MAX_USERIP'} eq '')) && (!($proxysettings{'AUTH_METHOD'} eq 'none')) && (!($proxysettings{'AUTH_METHOD'} eq 'ident')))
3929 {
3930 print FILE " !concurrent";
3931 }
3932 if ($proxysettings{'TIME_ACCESS_MODE'} eq 'deny') {
3933 print FILE " !within_timeframe";
3934 } else {
3935 print FILE " within_timeframe"; }
3936 print FILE "\n";
3937
3938 print FILE "http_access deny all\n\n";
3939
3940 if (($proxysettings{'FORWARD_IPADDRESS'} eq 'off') || ($proxysettings{'FORWARD_VIA'} eq 'off'))
3941 {
3942 print FILE "#Strip HTTP Header\n";
3943
3944 if ($proxysettings{'FORWARD_IPADDRESS'} eq 'off')
3945 {
3946 print FILE "request_header_access X-Forwarded-For deny all\n";
3947 print FILE "reply_header_access X-Forwarded-For deny all\n";
3948 }
3949 if ($proxysettings{'FORWARD_VIA'} eq 'off')
3950 {
3951 print FILE "request_header_access Via deny all\n";
3952 print FILE "reply_header_access Via deny all\n";
3953 }
3954
3955 print FILE "\n";
3956
3957 }
3958
3959 if ((!-z $mimetypes) && ($proxysettings{'ENABLE_MIME_FILTER'} eq 'on')) {
3960 if (!-z $acl_src_unrestricted_ip) { print FILE "http_reply_access allow IPFire_unrestricted_ips\n"; }
3961 if (!-z $acl_src_unrestricted_mac) { print FILE "http_reply_access allow IPFire_unrestricted_mac\n"; }
3962 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
3963 {
3964 if (!-z $extgrp) { print FILE "http_reply_access allow for_extended_users\n"; }
3965 }
3966 print FILE "http_reply_access deny blocked_mimetypes\n";
3967 print FILE "http_reply_access allow all\n\n";
3968 }
3969
3970 print FILE "visible_hostname";
3971 if ($proxysettings{'VISIBLE_HOSTNAME'} eq '')
3972 {
3973 print FILE " $mainsettings{'HOSTNAME'}.$mainsettings{'DOMAINNAME'}\n\n";
3974 } else {
3975 print FILE " $proxysettings{'VISIBLE_HOSTNAME'}\n\n";
3976 }
3977
3978 if (!($proxysettings{'ADMIN_MAIL_ADDRESS'} eq '')) { print FILE "cache_mgr $proxysettings{'ADMIN_MAIL_ADDRESS'}\n"; }
3979 if (!($proxysettings{'ADMIN_PASSWORD'} eq '')) { print FILE "cachemgr_passwd $proxysettings{'ADMIN_PASSWORD'} all\n"; }
3980 print FILE "\n";
3981
3982 print FILE "max_filedescriptors $proxysettings{'FILEDESCRIPTORS'}\n\n";
3983
3984 # Write the parent proxy info, if needed.
3985 if ($remotehost ne '')
3986 {
3987 print FILE "cache_peer $remotehost parent $remoteport 3130 default no-query";
3988
3989 # Enter authentication for the parent cache. Option format is
3990 # login=user:password ($proxy1='YES')
3991 # login=PASS ($proxy1='PASS')
3992 # login=*:password ($proxysettings{'FORWARD_USERNAME'} eq 'on')
3993 if (($proxy1 eq 'YES') || ($proxy1 eq 'PASS'))
3994 {
3995 print FILE " login=$proxysettings{'UPSTREAM_USER'}";
3996 if ($proxy1 eq 'YES') { print FILE ":$proxysettings{'UPSTREAM_PASSWORD'}"; }
3997 }
3998 elsif ($proxysettings{'FORWARD_USERNAME'} eq 'on') { print FILE " login=*:password"; }
3999
4000 print FILE "\nalways_direct allow IPFire_ips\n";
4001 print FILE "never_direct allow all\n\n";
4002 }
4003 if (($proxysettings{'ENABLE_FILTER'} eq 'on') || ($proxysettings{'ENABLE_UPDXLRATOR'} eq 'on') || ($proxysettings{'ENABLE_CLAMAV'} eq 'on'))
4004 {
4005 print FILE "url_rewrite_program /usr/sbin/redirect_wrapper\n";
4006 print FILE "url_rewrite_children ", &General::number_cpu_cores();
4007 print FILE " startup=", &General::number_cpu_cores();
4008 print FILE " idle=", &General::number_cpu_cores();
4009 print FILE " queue-size=", &General::number_cpu_cores() * 32, "\n\n";
4010 }
4011
4012 # Include file with user defined settings.
4013 if (-e "/etc/squid/squid.conf.local") {
4014 print FILE "include /etc/squid/squid.conf.local\n";
4015 }
4016 close FILE;
4017
4018 # Proxy settings for squidclamav - if installed.
4019 #
4020 # Check if squidclamav is enabled.
4021 if ($proxysettings{'ENABLE_CLAMAV'} eq 'on') {
4022
4023 my $configfile='/etc/squidclamav.conf';
4024
4025 my $data = &General::read_file_utf8($configfile);
4026 $data =~ s/squid_port [0-9]+/squid_port $proxysettings{'PROXY_PORT'}/g;
4027 &General::write_file_utf8($configfile, $data);
4028 }
4029 }
4030
4031 # -------------------------------------------------------------------
4032
4033 sub adduser
4034 {
4035 my ($str_user, $str_pass, $str_group) = @_;
4036 my @groupmembers=();
4037
4038 if ($str_pass eq 'lEaVeAlOnE')
4039 {
4040 open(FILE, "$userdb");
4041 @groupmembers = <FILE>;
4042 close(FILE);
4043 foreach $line (@groupmembers) { if ($line =~ /^$str_user:/i) { $str_pass = substr($line,index($line,":")); } }
4044 &deluser($str_user);
4045 open(FILE, ">>$userdb");
4046 flock FILE,2;
4047 print FILE "$str_user$str_pass";
4048 close(FILE);
4049 } else {
4050 &deluser($str_user);
4051
4052 my %htpasswd_options = (
4053 passwdFile => "$userdb",
4054 UseMD5 => 1,
4055 );
4056
4057 my $htpasswd = new Apache::Htpasswd(\%htpasswd_options);
4058
4059 $htpasswd->htpasswd($str_user, $str_pass);
4060 }
4061
4062 if ($str_group eq 'standard') { open(FILE, ">>$stdgrp");
4063 } elsif ($str_group eq 'extended') { open(FILE, ">>$extgrp");
4064 } elsif ($str_group eq 'disabled') { open(FILE, ">>$disgrp"); }
4065 flock FILE, 2;
4066 print FILE "$str_user\n";
4067 close(FILE);
4068
4069 return;
4070 }
4071
4072 # -------------------------------------------------------------------
4073
4074 sub deluser
4075 {
4076 my ($str_user) = @_;
4077 my $groupfile='';
4078 my @groupmembers=();
4079 my @templist=();
4080
4081 foreach $groupfile ($stdgrp, $extgrp, $disgrp)
4082 {
4083 undef @templist;
4084 open(FILE, "$groupfile");
4085 @groupmembers = <FILE>;
4086 close(FILE);
4087 foreach $line (@groupmembers) { if (!($line =~ /^$str_user$/i)) { push(@templist, $line); } }
4088 open(FILE, ">$groupfile");
4089 flock FILE, 2;
4090 print FILE @templist;
4091 close(FILE);
4092 }
4093
4094 undef @templist;
4095 open(FILE, "$userdb");
4096 @groupmembers = <FILE>;
4097 close(FILE);
4098 foreach $line (@groupmembers) { if (!($line =~ /^$str_user:/i)) { push(@templist, $line); } }
4099 open(FILE, ">$userdb");
4100 flock FILE, 2;
4101 print FILE @templist;
4102 close(FILE);
4103
4104 return;
4105 }
4106
4107 # -------------------------------------------------------------------
4108
4109 sub writecachemgr
4110 {
4111 open(FILE, ">${General::swroot}/proxy/cachemgr.conf");
4112 flock(FILE, 2);
4113 if (&Header::green_used()) {
4114 print FILE "$netsettings{'GREEN_ADDRESS'}:$proxysettings{'PROXY_PORT'}\n";
4115 }
4116 print FILE "localhost";
4117 close(FILE);
4118 return;
4119 }
4120
4121 # -------------------------------------------------------------------