]> git.ipfire.org Git - people/pmueller/ipfire-2.x.git/blob - html/cgi-bin/proxy.cgi
suricata: Change midstream policy to "pass-flow"
[people/pmueller/ipfire-2.x.git] / html / cgi-bin / proxy.cgi
1 #!/usr/bin/perl
2 ###############################################################################
3 # #
4 # IPFire.org - A linux based firewall #
5 # Copyright (C) 2007-2021 IPFire Team <info@ipfire.org> #
6 # #
7 # This program is free software: you can redistribute it and/or modify #
8 # it under the terms of the GNU General Public License as published by #
9 # the Free Software Foundation, either version 3 of the License, or #
10 # (at your option) any later version. #
11 # #
12 # This program is distributed in the hope that it will be useful, #
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of #
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
15 # GNU General Public License for more details. #
16 # #
17 # You should have received a copy of the GNU General Public License #
18 # along with this program. If not, see <http://www.gnu.org/licenses/>. #
19 # #
20 ###############################################################################
21
22 use strict;
23 use Apache::Htpasswd;
24 use Scalar::Util qw(looks_like_number);
25
26 # enable only the following on debugging purpose
27 #use warnings;
28 #use CGI::Carp 'fatalsToBrowser';
29
30 require '/var/ipfire/general-functions.pl';
31 require "${General::swroot}/lang.pl";
32 require "${General::swroot}/header.pl";
33
34 require "${General::swroot}/ids-functions.pl";
35
36 my @squidversion = &General::system_output("/usr/sbin/squid", "-v");
37 my $http_port='81';
38 my $https_port='444';
39
40 my %color = ();
41 my %mainsettings = ();
42 &General::readhash("${General::swroot}/main/settings", \%mainsettings);
43 &General::readhash("/srv/web/ipfire/html/themes/ipfire/include/colors.txt", \%color);
44
45 my %proxysettings=();
46 my %netsettings=();
47 my %filtersettings=();
48 my %xlratorsettings=();
49 my %stdproxysettings=();
50 my %mainsettings=();
51
52 my %checked=();
53 my %selected=();
54
55 my @throttle_limits=(64,128,256,512,1024,1536,2048,3072,4096,5120,6144,7168,8192,10240,16384,20480,51200,102400);
56
57 my $def_ports_safe="80 # http\n21 # ftp\n443 # https\n563 # snews\n70 # gopher\n210 # wais\n1025-65535 # unregistered ports\n280 # http-mgmt\n488 # gss-http\n591 # filemaker\n777 # multiling http\n800 # Squids port (for icons)\n";
58 my $def_ports_ssl="443 # https\n563 # snews\n";
59
60 my $hintcolour='#FFFFCC';
61 my $ncsa_buttontext='';
62 my $language='';
63 my $i=0;
64 my $n=0;
65 my $id=0;
66 my $line='';
67 my $user='';
68 my @userlist=();
69 my @grouplist=();
70 my @temp=();
71 my @templist=();
72
73 my $cachemem=0;
74 my $proxy1='';
75 my $proxy2='';
76 my $browser_regexp='';
77 my $needhup = 0;
78 my $errormessage='';
79
80 my $acldir = "${General::swroot}/proxy/advanced/acls";
81 my $ncsadir = "${General::swroot}/proxy/advanced/ncsa";
82 my $raddir = "${General::swroot}/proxy/advanced/radius";
83 my $identdir = "${General::swroot}/proxy/advanced/ident";
84 my $credir = "${General::swroot}/proxy/advanced/cre";
85
86 my $userdb = "$ncsadir/passwd";
87 my $stdgrp = "$ncsadir/standard.grp";
88 my $extgrp = "$ncsadir/extended.grp";
89 my $disgrp = "$ncsadir/disabled.grp";
90
91 my $mimetypes = "${General::swroot}/proxy/advanced/mimetypes";
92 my $throttled_urls = "${General::swroot}/proxy/advanced/throttle";
93
94 my $cre_enabled = "${General::swroot}/proxy/advanced/cre/enable";
95 my $cre_groups = "${General::swroot}/proxy/advanced/cre/classrooms";
96 my $cre_svhosts = "${General::swroot}/proxy/advanced/cre/supervisors";
97
98 my $identhosts = "$identdir/hosts";
99
100 my $authdir = "/usr/lib/squid";
101 my $errordir = "/usr/lib/squid/errors";
102
103 my $acl_src_subnets = "$acldir/src_subnets.acl";
104 my $acl_src_banned_ip = "$acldir/src_banned_ip.acl";
105 my $acl_src_banned_mac = "$acldir/src_banned_mac.acl";
106 my $acl_src_unrestricted_ip = "$acldir/src_unrestricted_ip.acl";
107 my $acl_src_unrestricted_mac = "$acldir/src_unrestricted_mac.acl";
108 my $acl_src_noaccess_ip = "$acldir/src_noaccess_ip.acl";
109 my $acl_src_noaccess_mac = "$acldir/src_noaccess_mac.acl";
110 my $acl_dst_noauth = "$acldir/dst_noauth.acl";
111 my $acl_dst_noauth_dom = "$acldir/dst_noauth_dom.acl";
112 my $acl_dst_noauth_net = "$acldir/dst_noauth_net.acl";
113 my $acl_dst_noauth_url = "$acldir/dst_noauth_url.acl";
114 my $acl_dst_nocache = "$acldir/dst_nocache.acl";
115 my $acl_dst_nocache_dom = "$acldir/dst_nocache_dom.acl";
116 my $acl_dst_nocache_net = "$acldir/dst_nocache_net.acl";
117 my $acl_dst_nocache_url = "$acldir/dst_nocache_url.acl";
118 my $acl_dst_throttle = "$acldir/dst_throttle.acl";
119 my $acl_ports_safe = "$acldir/ports_safe.acl";
120 my $acl_ports_ssl = "$acldir/ports_ssl.acl";
121 my $acl_include = "$acldir/include.acl";
122
123 my $acl_dst_noproxy_url = "$acldir/dst_noproxy_url.acl";
124 my $acl_dst_noproxy_ip = "$acldir/dst_noproxy_ip.acl";
125
126 my $updaccelversion = 'n/a';
127 my $urlfilterversion = 'n/a';
128
129 unless (-d "$acldir") { mkdir("$acldir"); }
130 unless (-d "$ncsadir") { mkdir("$ncsadir"); }
131 unless (-d "$raddir") { mkdir("$raddir"); }
132 unless (-d "$identdir") { mkdir("$identdir"); }
133 unless (-d "$credir") { mkdir("$credir"); }
134
135 unless (-e $cre_groups) { &General::system("touch", "$cre_groups"); }
136 unless (-e $cre_svhosts) { &General::system("touch $cre_svhosts"); }
137
138 unless (-e $userdb) { &General::system("touch", "$userdb"); }
139 unless (-e $stdgrp) { &General::system("touch", "$stdgrp"); }
140 unless (-e $extgrp) { &General::system("touch", "$extgrp"); }
141 unless (-e $disgrp) { &General::system("touch", "$disgrp"); }
142
143 unless (-e $acl_src_subnets) { &General::system("touch", "$acl_src_subnets"); }
144 unless (-e $acl_src_banned_ip) { &General::system("touch", "$acl_src_banned_ip"); }
145 unless (-e $acl_src_banned_mac) { &General::system("touch", "$acl_src_banned_mac"); }
146 unless (-e $acl_src_unrestricted_ip) { &General::system("touch", "$acl_src_unrestricted_ip"); }
147 unless (-e $acl_src_unrestricted_mac) { &General::system("touch", "$acl_src_unrestricted_mac"); }
148 unless (-e $acl_src_noaccess_ip) { &General::system("touch", "$acl_src_noaccess_ip"); }
149 unless (-e $acl_src_noaccess_mac) { &General::system("touch", "$acl_src_noaccess_mac"); }
150 unless (-e $acl_dst_noauth) { &General::system("touch", "$acl_dst_noauth"); }
151 unless (-e $acl_dst_noauth_dom) { &General::system("touch", "$acl_dst_noauth_dom"); }
152 unless (-e $acl_dst_noauth_net) { &General::system("touch", "$acl_dst_noauth_net"); }
153 unless (-e $acl_dst_noauth_url) { &General::system("touch", "$acl_dst_noauth_url"); }
154 unless (-e $acl_dst_nocache) { &General::system("touch", "$acl_dst_nocache"); }
155 unless (-e $acl_dst_nocache_dom) { &General::system("touch", "$acl_dst_nocache_dom"); }
156 unless (-e $acl_dst_nocache_net) { &General::system("touch", "$acl_dst_nocache_net"); }
157 unless (-e $acl_dst_nocache_url) { &General::system("touch", "$acl_dst_nocache_url"); }
158 unless (-e $acl_dst_throttle) { &General::system("touch", "$acl_dst_throttle"); }
159 unless (-e $acl_ports_safe) { &General::system("touch", "$acl_ports_safe"); }
160 unless (-e $acl_ports_ssl) { &General::system("touch", "$acl_ports_ssl"); }
161 unless (-e $acl_include) { &General::system("touch", "$acl_include"); }
162
163 unless (-e $mimetypes) { &General::system("touch", "$mimetypes"); }
164
165 my $HAVE_NTLM_AUTH = (-e "/usr/bin/ntlm_auth");
166
167 &General::readhash("${General::swroot}/ethernet/settings", \%netsettings);
168 &General::readhash("${General::swroot}/main/settings", \%mainsettings);
169
170 my $green_cidr = "";
171 if (&Header::green_used() && $netsettings{'GREEN_DEV'}) {
172 $green_cidr = &General::ipcidr("$netsettings{'GREEN_NETADDRESS'}\/$netsettings{'GREEN_NETMASK'}");
173 }
174
175 my $blue_cidr = "";
176 if (&Header::blue_used() && $netsettings{'BLUE_DEV'}) {
177 $blue_cidr = &General::ipcidr("$netsettings{'BLUE_NETADDRESS'}\/$netsettings{'BLUE_NETMASK'}");
178 }
179
180 &Header::showhttpheaders();
181
182 $proxysettings{'ACTION'} = '';
183 $proxysettings{'VALID'} = '';
184
185 $proxysettings{'ENABLE'} = 'off';
186 $proxysettings{'ENABLE_BLUE'} = 'off';
187 $proxysettings{'TRANSPARENT'} = 'off';
188 $proxysettings{'TRANSPARENT_BLUE'} = 'off';
189 $proxysettings{'PROXY_PORT'} = '800';
190 $proxysettings{'TRANSPARENT_PORT'} = '3128';
191 $proxysettings{'VISIBLE_HOSTNAME'} = '';
192 $proxysettings{'ADMIN_MAIL_ADDRESS'} = '';
193 $proxysettings{'ADMIN_PASSWORD'} = '';
194 $proxysettings{'ERR_LANGUAGE'} = 'en';
195 $proxysettings{'ERR_DESIGN'} = 'ipfire';
196 $proxysettings{'FORWARD_VIA'} = 'off';
197 $proxysettings{'FORWARD_IPADDRESS'} = 'off';
198 $proxysettings{'FORWARD_USERNAME'} = 'off';
199 $proxysettings{'NO_CONNECTION_AUTH'} = 'off';
200 $proxysettings{'UPSTREAM_PROXY'} = '';
201 $proxysettings{'UPSTREAM_USER'} = '';
202 $proxysettings{'UPSTREAM_PASSWORD'} = '';
203 $proxysettings{'LOGGING'} = 'off';
204 $proxysettings{'CACHEMGR'} = 'off';
205 $proxysettings{'LOGQUERY'} = 'off';
206 $proxysettings{'LOGUSERAGENT'} = 'off';
207 $proxysettings{'FILEDESCRIPTORS'} = '16384';
208 $proxysettings{'CACHE_MEM'} = '128';
209 $proxysettings{'CACHE_SIZE'} = '0';
210 $proxysettings{'MAX_SIZE'} = '4096';
211 $proxysettings{'MIN_SIZE'} = '0';
212 $proxysettings{'MEM_POLICY'} = 'LRU';
213 $proxysettings{'CACHE_POLICY'} = 'LRU';
214 $proxysettings{'L1_DIRS'} = '16';
215 $proxysettings{'OFFLINE_MODE'} = 'off';
216 $proxysettings{'CACHE_DIGESTS'} = 'off';
217 $proxysettings{'CLASSROOM_EXT'} = 'off';
218 $proxysettings{'SUPERVISOR_PASSWORD'} = '';
219 $proxysettings{'NO_PROXY_LOCAL'} = 'off';
220 $proxysettings{'NO_PROXY_LOCAL_BLUE'} = 'off';
221 $proxysettings{'TIME_ACCESS_MODE'} = 'allow';
222 $proxysettings{'TIME_FROM_HOUR'} = '00';
223 $proxysettings{'TIME_FROM_MINUTE'} = '00';
224 $proxysettings{'TIME_TO_HOUR'} = '24';
225 $proxysettings{'TIME_TO_MINUTE'} = '00';
226 $proxysettings{'MAX_OUTGOING_SIZE'} = '0';
227 $proxysettings{'MAX_INCOMING_SIZE'} = '0';
228 $proxysettings{'THROTTLING_GREEN_TOTAL'} = 'unlimited';
229 $proxysettings{'THROTTLING_GREEN_HOST'} = 'unlimited';
230 $proxysettings{'THROTTLING_BLUE_TOTAL'} = 'unlimited';
231 $proxysettings{'THROTTLING_BLUE_HOST'} = 'unlimited';
232 $proxysettings{'ASNBL_FASTFLUX_DETECTION'} = 'off';
233 $proxysettings{'ASNBL_FASTFLUX_THRESHOLD'} = '5';
234 $proxysettings{'ASNBL_SELECANN_DETECTION'} = 'off';
235 $proxysettings{'ENABLE_MIME_FILTER'} = 'off';
236 $proxysettings{'AUTH_METHOD'} = 'none';
237 $proxysettings{'AUTH_REALM'} = '';
238 $proxysettings{'AUTH_MAX_USERIP'} = '';
239 $proxysettings{'AUTH_CACHE_TTL'} = '60';
240 $proxysettings{'AUTH_IPCACHE_TTL'} = '0';
241 $proxysettings{'AUTH_CHILDREN'} = '5';
242 $proxysettings{'NCSA_MIN_PASS_LEN'} = '6';
243 $proxysettings{'NCSA_BYPASS_REDIR'} = 'off';
244 $proxysettings{'NCSA_USERNAME'} = '';
245 $proxysettings{'NCSA_GROUP'} = '';
246 $proxysettings{'NCSA_PASS'} = '';
247 $proxysettings{'NCSA_PASS_CONFIRM'} = '';
248 $proxysettings{'LDAP_BASEDN'} = '';
249 $proxysettings{'LDAP_TYPE'} = 'ADS';
250 $proxysettings{'LDAP_SERVER'} = '';
251 $proxysettings{'LDAP_PORT'} = '389';
252 $proxysettings{'LDAP_BINDDN_USER'} = '';
253 $proxysettings{'LDAP_BINDDN_PASS'} = '';
254 $proxysettings{'LDAP_GROUP'} = '';
255 $proxysettings{'NTLM_AUTH_GROUP'} = '';
256 $proxysettings{'NTLM_AUTH_BASIC'} = 'off';
257 $proxysettings{'NTLM_DOMAIN'} = '';
258 $proxysettings{'NTLM_PDC'} = '';
259 $proxysettings{'NTLM_BDC'} = '';
260 $proxysettings{'NTLM_ENABLE_ACL'} = 'off';
261 $proxysettings{'NTLM_USER_ACL'} = 'positive';
262 $proxysettings{'RADIUS_SERVER'} = '';
263 $proxysettings{'RADIUS_PORT'} = '1812';
264 $proxysettings{'RADIUS_IDENTIFIER'} = '';
265 $proxysettings{'RADIUS_SECRET'} = '';
266 $proxysettings{'RADIUS_ENABLE_ACL'} = 'off';
267 $proxysettings{'RADIUS_USER_ACL'} = 'positive';
268 $proxysettings{'IDENT_REQUIRED'} = 'off';
269 $proxysettings{'IDENT_TIMEOUT'} = '10';
270 $proxysettings{'IDENT_ENABLE_ACL'} = 'off';
271 $proxysettings{'IDENT_USER_ACL'} = 'positive';
272 $proxysettings{'ENABLE_FILTER'} = 'off';
273 $proxysettings{'ENABLE_UPDXLRATOR'} = 'off';
274 $proxysettings{'ENABLE_CLAMAV'} = 'off';
275
276 $ncsa_buttontext = $Lang::tr{'advproxy NCSA create user'};
277
278 &Header::getcgihash(\%proxysettings);
279
280 if ($proxysettings{'THROTTLING_GREEN_TOTAL'} eq 0) {$proxysettings{'THROTTLING_GREEN_TOTAL'} = 'unlimited';}
281 if ($proxysettings{'THROTTLING_GREEN_HOST'} eq 0) {$proxysettings{'THROTTLING_GREEN_HOST'} = 'unlimited';}
282 if ($proxysettings{'THROTTLING_BLUE_TOTAL'} eq 0) {$proxysettings{'THROTTLING_BLUE_TOTAL'} = 'unlimited';}
283 if ($proxysettings{'THROTTLING_BLUE_HOST'} eq 0) {$proxysettings{'THROTTLING_BLUE_HOST'} = 'unlimited';}
284
285 if ($proxysettings{'ACTION'} eq $Lang::tr{'advproxy NCSA user management'})
286 {
287 $proxysettings{'NCSA_EDIT_MODE'} = 'yes';
288 }
289
290 if ($proxysettings{'ACTION'} eq $Lang::tr{'add'})
291 {
292 $proxysettings{'NCSA_EDIT_MODE'} = 'yes';
293 if (length($proxysettings{'NCSA_PASS'}) < $proxysettings{'NCSA_MIN_PASS_LEN'}) {
294 $errormessage = $Lang::tr{'advproxy errmsg password length 1'}.$proxysettings{'NCSA_MIN_PASS_LEN'}.$Lang::tr{'advproxy errmsg password length 2'};
295 }
296 if (!($proxysettings{'NCSA_PASS'} eq $proxysettings{'NCSA_PASS_CONFIRM'})) {
297 $errormessage = $Lang::tr{'advproxy errmsg passwords different'};
298 }
299 if ($proxysettings{'NCSA_USERNAME'} eq '') {
300 $errormessage = $Lang::tr{'advproxy errmsg no username'};
301 }
302 if (!$errormessage) {
303 $proxysettings{'NCSA_USERNAME'} =~ tr/A-Z/a-z/;
304 &adduser($proxysettings{'NCSA_USERNAME'}, $proxysettings{'NCSA_PASS'}, $proxysettings{'NCSA_GROUP'});
305 }
306 $proxysettings{'NCSA_USERNAME'} = '';
307 $proxysettings{'NCSA_GROUP'} = '';
308 $proxysettings{'NCSA_PASS'} = '';
309 $proxysettings{'NCSA_PASS_CONFIRM'} = '';
310 }
311
312 if ($proxysettings{'ACTION'} eq $Lang::tr{'remove'})
313 {
314 $proxysettings{'NCSA_EDIT_MODE'} = 'yes';
315 &deluser($proxysettings{'ID'});
316 }
317
318 $checked{'ENABLE_UPDXLRATOR'}{'off'} = '';
319 $checked{'ENABLE_UPDXLRATOR'}{'on'} = '';
320 $checked{'ENABLE_UPDXLRATOR'}{$proxysettings{'ENABLE_UPDXLRATOR'}} = "checked='checked'";
321
322 if ($proxysettings{'ACTION'} eq $Lang::tr{'edit'})
323 {
324 $proxysettings{'NCSA_EDIT_MODE'} = 'yes';
325 $ncsa_buttontext = $Lang::tr{'advproxy NCSA update user'};
326 @temp = split(/:/,$proxysettings{'ID'});
327 $proxysettings{'NCSA_USERNAME'} = $temp[0];
328 $proxysettings{'NCSA_GROUP'} = $temp[1];
329 $proxysettings{'NCSA_PASS'} = "lEaVeAlOnE";
330 $proxysettings{'NCSA_PASS_CONFIRM'} = $proxysettings{'NCSA_PASS'};
331 }
332
333 if (($proxysettings{'ACTION'} eq $Lang::tr{'save'}) || ($proxysettings{'ACTION'} eq $Lang::tr{'advproxy save and restart'}) || ($proxysettings{'ACTION'} eq $Lang::tr{'proxy reconfigure'}))
334 {
335 if ($proxysettings{'ENABLE'} !~ /^(on|off)$/ ||
336 $proxysettings{'TRANSPARENT'} !~ /^(on|off)$/ ||
337 $proxysettings{'ENABLE_BLUE'} !~ /^(on|off)$/ ||
338 $proxysettings{'TRANSPARENT_BLUE'} !~ /^(on|off)$/ ) {
339 $errormessage = $Lang::tr{'invalid input'};
340 goto ERROR;
341 }
342 if($proxysettings{'CACHE_MEM'} > $proxysettings{'CACHE_SIZE'} && $proxysettings{'CACHE_SIZE'} > 0){
343 $errormessage = $Lang::tr{'advproxy errmsg cache'}." ".$proxysettings{'CACHE_MEM'}." > ".$proxysettings{'CACHE_SIZE'};
344 goto ERROR;
345 }
346
347 if (!(&General::validport($proxysettings{'PROXY_PORT'})))
348 {
349 $errormessage = $Lang::tr{'advproxy errmsg invalid proxy port'};
350 goto ERROR;
351 }
352 if (!(&General::validport($proxysettings{'TRANSPARENT_PORT'})))
353 {
354 $errormessage = $Lang::tr{'advproxy errmsg invalid proxy port'};
355 goto ERROR;
356 }
357 if ($proxysettings{'PROXY_PORT'} eq $proxysettings{'TRANSPARENT_PORT'}) {
358 $errormessage = $Lang::tr{'advproxy errmsg proxy ports equal'};
359 goto ERROR;
360 }
361 if (!($proxysettings{'UPSTREAM_PROXY'} eq ''))
362 {
363 my @temp = split(/:/,$proxysettings{'UPSTREAM_PROXY'});
364 if (!(&General::validip($temp[0])))
365 {
366 if (!(&General::validdomainname($temp[0])))
367 {
368 $errormessage = $Lang::tr{'advproxy errmsg invalid upstream proxy'};
369 goto ERROR;
370 }
371 }
372 }
373 if (!($proxysettings{'CACHE_SIZE'} =~ /^\d+/) ||
374 ($proxysettings{'CACHE_SIZE'} < 10))
375 {
376 if (!($proxysettings{'CACHE_SIZE'} eq '0'))
377 {
378 $errormessage = $Lang::tr{'advproxy errmsg hdd cache size'};
379 goto ERROR;
380 }
381 }
382 if (!($proxysettings{'FILEDESCRIPTORS'} =~ /^\d+/) ||
383 ($proxysettings{'FILEDESCRIPTORS'} < 1) || ($proxysettings{'FILEDESCRIPTORS'} > 1048576))
384 {
385 $errormessage = $Lang::tr{'proxy errmsg filedescriptors'};
386 goto ERROR;
387 }
388 if (!($proxysettings{'CACHE_MEM'} =~ /^\d+/))
389 {
390 $errormessage = $Lang::tr{'advproxy errmsg mem cache size'};
391 goto ERROR;
392 }
393 my @free = &General::system_output("/usr/bin/free");
394 $free[1] =~ m/(\d+)/;
395 $cachemem = int $1 / 2048;
396 if ($proxysettings{'CACHE_MEM'} > $cachemem) {
397 $proxysettings{'CACHE_MEM'} = $cachemem;
398 }
399 if (!($proxysettings{'MAX_SIZE'} =~ /^\d+/))
400 {
401 $errormessage = $Lang::tr{'invalid maximum object size'};
402 goto ERROR;
403 }
404 if (!($proxysettings{'MIN_SIZE'} =~ /^\d+/))
405 {
406 $errormessage = $Lang::tr{'invalid minimum object size'};
407 goto ERROR;
408 }
409 if (!($proxysettings{'MAX_OUTGOING_SIZE'} =~ /^\d+/))
410 {
411 $errormessage = $Lang::tr{'invalid maximum outgoing size'};
412 goto ERROR;
413 }
414 if (!($proxysettings{'TIME_TO_HOUR'}.$proxysettings{'TIME_TO_MINUTE'} gt $proxysettings{'TIME_FROM_HOUR'}.$proxysettings{'TIME_FROM_MINUTE'}))
415 {
416 $errormessage = $Lang::tr{'advproxy errmsg time restriction'};
417 goto ERROR;
418 }
419 if (!($proxysettings{'MAX_INCOMING_SIZE'} =~ /^\d+/))
420 {
421 $errormessage = $Lang::tr{'invalid maximum incoming size'};
422 goto ERROR;
423 }
424 if (($proxysettings{'ASNBL_FASTFLUX_DETECTION'} eq 'on') || ($proxysettings{'ASNBL_SELECANN_DETECTION'} eq 'on'))
425 {
426 if (-z $proxysettings{'ASNBL_FASTFLUX_THRESHOLD'}) {
427 $errormessage = $Lang::tr{'advproxy fastflux no threshold given'};
428 goto ERROR;
429 }
430 if (! looks_like_number($proxysettings{'ASNBL_FASTFLUX_THRESHOLD'})) {
431 $errormessage = $Lang::tr{'advproxy fastflux threshold invalid'};
432 goto ERROR;
433 }
434 if (($proxysettings{'ASNBL_FASTFLUX_THRESHOLD'} < 2) || ($proxysettings{'ASNBL_FASTFLUX_THRESHOLD'} > 10)) {
435 $errormessage = $Lang::tr{'advproxy fastflux threshold out of bounds'};
436 goto ERROR;
437 }
438 }
439 if (!($proxysettings{'AUTH_METHOD'} eq 'none'))
440 {
441 unless (($proxysettings{'AUTH_METHOD'} eq 'ident') &&
442 ($proxysettings{'IDENT_REQUIRED'} eq 'off') &&
443 ($proxysettings{'IDENT_ENABLE_ACL'} eq 'off'))
444 {
445 if ($netsettings{'BLUE_DEV'})
446 {
447 if ((($proxysettings{'ENABLE'} eq 'off') || ($proxysettings{'TRANSPARENT'} eq 'on')) &&
448 (($proxysettings{'ENABLE_BLUE'} eq 'off') || ($proxysettings{'TRANSPARENT_BLUE'} eq 'on')))
449 {
450 $errormessage = $Lang::tr{'advproxy errmsg non-transparent proxy required'};
451 goto ERROR;
452 }
453 } else {
454 if (($proxysettings{'ENABLE'} eq 'off') || ($proxysettings{'TRANSPARENT'} eq 'on'))
455 {
456 $errormessage = $Lang::tr{'advproxy errmsg non-transparent proxy required'};
457 goto ERROR;
458 }
459 }
460 }
461 if ((!($proxysettings{'AUTH_MAX_USERIP'} eq '')) &&
462 ((!($proxysettings{'AUTH_MAX_USERIP'} =~ /^\d+/)) || ($proxysettings{'AUTH_MAX_USERIP'} < 1) || ($proxysettings{'AUTH_MAX_USERIP'} > 255)))
463 {
464 $errormessage = $Lang::tr{'advproxy errmsg max userip'};
465 goto ERROR;
466 }
467 if (!($proxysettings{'AUTH_CACHE_TTL'} =~ /^\d+/))
468 {
469 $errormessage = $Lang::tr{'advproxy errmsg auth cache ttl'};
470 goto ERROR;
471 }
472 if (!($proxysettings{'AUTH_IPCACHE_TTL'} =~ /^\d+/))
473 {
474 $errormessage = $Lang::tr{'advproxy errmsg auth ipcache ttl'};
475 goto ERROR;
476 }
477 if ((!($proxysettings{'AUTH_MAX_USERIP'} eq '')) && ($proxysettings{'AUTH_IPCACHE_TTL'} eq '0'))
478 {
479 $errormessage = $Lang::tr{'advproxy errmsg auth ipcache may not be null'};
480 goto ERROR;
481 }
482 if ((!($proxysettings{'AUTH_CHILDREN'} =~ /^\d+/)) || ($proxysettings{'AUTH_CHILDREN'} < 1) || ($proxysettings{'AUTH_CHILDREN'} > 255))
483 {
484 $errormessage = $Lang::tr{'advproxy errmsg auth children'};
485 goto ERROR;
486 }
487 }
488 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
489 {
490 if ((!($proxysettings{'NCSA_MIN_PASS_LEN'} =~ /^\d+/)) || ($proxysettings{'NCSA_MIN_PASS_LEN'} < 1) || ($proxysettings{'NCSA_MIN_PASS_LEN'} > 255))
491 {
492 $errormessage = $Lang::tr{'advproxy errmsg password length'};
493 goto ERROR;
494 }
495 }
496 if ($proxysettings{'AUTH_METHOD'} eq 'ident')
497 {
498 if ((!($proxysettings{'IDENT_TIMEOUT'} =~ /^\d+/)) || ($proxysettings{'IDENT_TIMEOUT'} < 1))
499 {
500 $errormessage = $Lang::tr{'advproxy errmsg ident timeout'};
501 goto ERROR;
502 }
503 }
504 if ($proxysettings{'AUTH_METHOD'} eq 'ldap')
505 {
506 if ($proxysettings{'LDAP_BASEDN'} eq '')
507 {
508 $errormessage = $Lang::tr{'advproxy errmsg ldap base dn'};
509 goto ERROR;
510 }
511 if (!&General::validip($proxysettings{'LDAP_SERVER'}))
512 {
513 if (!&General::validdomainname($proxysettings{'LDAP_SERVER'}))
514 {
515 $errormessage = $Lang::tr{'advproxy errmsg ldap server'};
516 goto ERROR;
517 }
518 }
519 if (!&General::validport($proxysettings{'LDAP_PORT'}))
520 {
521 $errormessage = $Lang::tr{'advproxy errmsg ldap port'};
522 goto ERROR;
523 }
524 if (($proxysettings{'LDAP_TYPE'} eq 'ADS') || ($proxysettings{'LDAP_TYPE'} eq 'NDS'))
525 {
526 if (($proxysettings{'LDAP_BINDDN_USER'} eq '') || ($proxysettings{'LDAP_BINDDN_PASS'} eq ''))
527 {
528 $errormessage = $Lang::tr{'advproxy errmsg ldap bind dn'};
529 goto ERROR;
530 }
531 }
532 }
533 if ($proxysettings{'AUTH_METHOD'} eq 'radius')
534 {
535 if (!&General::validip($proxysettings{'RADIUS_SERVER'}))
536 {
537 $errormessage = $Lang::tr{'advproxy errmsg radius server'};
538 goto ERROR;
539 }
540 if (!&General::validport($proxysettings{'RADIUS_PORT'}))
541 {
542 $errormessage = $Lang::tr{'advproxy errmsg radius port'};
543 goto ERROR;
544 }
545 if ($proxysettings{'RADIUS_SECRET'} eq '')
546 {
547 $errormessage = $Lang::tr{'advproxy errmsg radius secret'};
548 goto ERROR;
549 }
550 }
551
552 # Quick parent proxy error checking of username and password info. If username password don't both exist give an error.
553 $proxy1 = 'YES';
554 $proxy2 = 'YES';
555 if (($proxysettings{'UPSTREAM_USER'} eq '')) {$proxy1 = '';}
556 if (($proxysettings{'UPSTREAM_PASSWORD'} eq '')) {$proxy2 = '';}
557 if ($proxysettings{'UPSTREAM_USER'} eq 'PASS') {$proxy1=$proxy2='PASS'; $proxysettings{'UPSTREAM_PASSWORD'} = '';}
558 if (($proxy1 ne $proxy2))
559 {
560 $errormessage = $Lang::tr{'advproxy errmsg invalid upstream proxy username or password setting'};
561 goto ERROR;
562 }
563
564 ERROR:
565 &check_acls;
566
567 if ($errormessage) {
568 $proxysettings{'VALID'} = 'no'; }
569 else {
570 $proxysettings{'VALID'} = 'yes'; }
571
572 if ($proxysettings{'VALID'} eq 'yes')
573 {
574 # Determine if suricata may needs to be restarted.
575 my $suricata_proxy_ports_changed;
576
577 # Check if the IDS is running
578 if(&IDS::ids_is_running()) {
579 my %oldproxysettings;
580
581 # Read-in current proxy settings and store them as oldsettings hash.
582 &General::readhash("${General::swroot}/proxy/advanced/settings", \%oldproxysettings);
583
584 # Check if the proxy port has been changed.
585 unless ($proxysettings{'PROXY_PORT'} eq $oldproxysettings{'PROXY_PORT'}) {
586 # Port has changed, suricata needs to be adjusted.
587 $suricata_proxy_ports_changed = 1;
588 }
589
590 # Check if the transparent port has been changed.
591 unless ($proxysettings{'TRANSPARENT_PORT'} eq $oldproxysettings{'TRANSPARENT_PORT'}) {
592 # Transparent port has changed, suricata needs to be adjusted.
593 $suricata_proxy_ports_changed = 1;
594 }
595 }
596
597 &write_acls;
598
599 delete $proxysettings{'SRC_SUBNETS'};
600 delete $proxysettings{'SRC_BANNED_IP'};
601 delete $proxysettings{'SRC_BANNED_MAC'};
602 delete $proxysettings{'SRC_UNRESTRICTED_IP'};
603 delete $proxysettings{'SRC_UNRESTRICTED_MAC'};
604 delete $proxysettings{'DST_NOCACHE'};
605 delete $proxysettings{'DST_NOAUTH'};
606 delete $proxysettings{'DST_NOPROXY_IP'};
607 delete $proxysettings{'DST_NOPROXY_URL'};
608 delete $proxysettings{'PORTS_SAFE'};
609 delete $proxysettings{'PORTS_SSL'};
610 delete $proxysettings{'MIME_TYPES'};
611 delete $proxysettings{'NTLM_ALLOW_USERS'};
612 delete $proxysettings{'NTLM_DENY_USERS'};
613 delete $proxysettings{'RADIUS_ALLOW_USERS'};
614 delete $proxysettings{'RADIUS_DENY_USERS'};
615 delete $proxysettings{'IDENT_HOSTS'};
616 delete $proxysettings{'IDENT_ALLOW_USERS'};
617 delete $proxysettings{'IDENT_DENY_USERS'};
618
619 delete $proxysettings{'CRE_GROUPS'};
620 delete $proxysettings{'CRE_SVHOSTS'};
621
622 delete $proxysettings{'NCSA_USERNAME'};
623 delete $proxysettings{'NCSA_GROUP'};
624 delete $proxysettings{'NCSA_PASS'};
625 delete $proxysettings{'NCSA_PASS_CONFIRM'};
626
627 $proxysettings{'TIME_MON'} = 'off' unless exists $proxysettings{'TIME_MON'};
628 $proxysettings{'TIME_TUE'} = 'off' unless exists $proxysettings{'TIME_TUE'};
629 $proxysettings{'TIME_WED'} = 'off' unless exists $proxysettings{'TIME_WED'};
630 $proxysettings{'TIME_THU'} = 'off' unless exists $proxysettings{'TIME_THU'};
631 $proxysettings{'TIME_FRI'} = 'off' unless exists $proxysettings{'TIME_FRI'};
632 $proxysettings{'TIME_SAT'} = 'off' unless exists $proxysettings{'TIME_SAT'};
633 $proxysettings{'TIME_SUN'} = 'off' unless exists $proxysettings{'TIME_SUN'};
634
635 $proxysettings{'AUTH_ALWAYS_REQUIRED'} = 'off' unless exists $proxysettings{'AUTH_ALWAYS_REQUIRED'};
636 $proxysettings{'NTLM_ENABLE_INT_AUTH'} = 'off' unless exists $proxysettings{'NTLM_ENABLE_INT_AUTH'};
637
638 &General::writehash("${General::swroot}/proxy/advanced/settings", \%proxysettings);
639
640 if (-e "${General::swroot}/proxy/settings") { &General::readhash("${General::swroot}/proxy/settings", \%stdproxysettings); }
641 $stdproxysettings{'PROXY_PORT'} = $proxysettings{'PROXY_PORT'};
642 $stdproxysettings{'UPSTREAM_PROXY'} = $proxysettings{'UPSTREAM_PROXY'};
643 $stdproxysettings{'UPSTREAM_USER'} = $proxysettings{'UPSTREAM_USER'};
644 $stdproxysettings{'UPSTREAM_PASSWORD'} = $proxysettings{'UPSTREAM_PASSWORD'};
645 $stdproxysettings{'ENABLE_FILTER'} = $proxysettings{'ENABLE_FILTER'};
646 $stdproxysettings{'ENABLE_UPDXLRATOR'} = $proxysettings{'ENABLE_UPDXLRATOR'};
647 $stdproxysettings{'ENABLE_CLAMAV'} = $proxysettings{'ENABLE_CLAMAV'};
648 &General::writehash("${General::swroot}/proxy/settings", \%stdproxysettings);
649
650 &writeconfig;
651 &writepacfile;
652
653 if ($proxysettings{'CACHEMGR'} eq 'on'){&writecachemgr;}
654
655 &General::system ('/usr/local/bin/squidctrl', 'disable');
656 unlink "${General::swroot}/proxy/enable";
657 unlink "${General::swroot}/proxy/transparent";
658 unlink "${General::swroot}/proxy/enable_blue";
659 unlink "${General::swroot}/proxy/transparent_blue";
660
661 if ($proxysettings{'ENABLE'} eq 'on') {
662 &General::system('/usr/bin/touch', "${General::swroot}/proxy/enable");
663 &General::system('/usr/local/bin/squidctrl', 'enable'); }
664 if ($proxysettings{'TRANSPARENT'} eq 'on' && $proxysettings{'ENABLE'} eq 'on') {
665 &General::system('/usr/bin/touch', "${General::swroot}/proxy/transparent"); }
666 if ($proxysettings{'ENABLE_BLUE'} eq 'on') {
667 &General::system('/usr/bin/touch', "${General::swroot}/proxy/enable_blue");
668 &General::system('/usr/local/bin/squidctrl', 'enable'); }
669 if ($proxysettings{'TRANSPARENT_BLUE'} eq 'on' && $proxysettings{'ENABLE_BLUE'} eq 'on') {
670 &General::system('/usr/bin/touch', "${General::swroot}/proxy/transparent_blue"); }
671
672 if ($proxysettings{'ACTION'} eq $Lang::tr{'advproxy save and restart'}) { &General::system('/usr/local/bin/squidctrl', 'restart'); }
673 if ($proxysettings{'ACTION'} eq $Lang::tr{'proxy reconfigure'}) { &General::system('/usr/local/bin/squidctrl', 'reconfigure'); }
674
675 # Check if the suricata_proxy_ports_changed flag has been set.
676 if ($suricata_proxy_ports_changed) {
677 # Re-generate HTTP ports file.
678 &IDS::generate_http_ports_file();
679
680 # Restart suricata.
681 &IDS::call_suricatactrl("restart");
682 }
683 }
684 }
685
686 if ($proxysettings{'ACTION'} eq $Lang::tr{'advproxy clear cache'})
687 {
688 &General::system('/usr/local/bin/squidctrl', 'flush');
689 }
690
691 if (!$errormessage)
692 {
693 if (-e "${General::swroot}/proxy/advanced/settings") {
694 &General::readhash("${General::swroot}/proxy/advanced/settings", \%proxysettings);
695 } elsif (-e "${General::swroot}/proxy/settings") {
696 &General::readhash("${General::swroot}/proxy/settings", \%proxysettings);
697 }
698 &read_acls;
699 }
700
701 # ------------------------------------------------------------------
702
703 # Hook to regenerate the configuration files, if cgi got called from command line.
704 if ($ENV{"REMOTE_ADDR"} eq "") {
705 writeconfig();
706 exit(0);
707 }
708
709 # -------------------------------------------------------------------
710
711 $checked{'ENABLE'}{'off'} = '';
712 $checked{'ENABLE'}{'on'} = '';
713 $checked{'ENABLE'}{$proxysettings{'ENABLE'}} = "checked='checked'";
714
715 $checked{'TRANSPARENT'}{'off'} = '';
716 $checked{'TRANSPARENT'}{'on'} = '';
717 $checked{'TRANSPARENT'}{$proxysettings{'TRANSPARENT'}} = "checked='checked'";
718
719 $checked{'ENABLE_BLUE'}{'off'} = '';
720 $checked{'ENABLE_BLUE'}{'on'} = '';
721 $checked{'ENABLE_BLUE'}{$proxysettings{'ENABLE_BLUE'}} = "checked='checked'";
722
723 $checked{'TRANSPARENT_BLUE'}{'off'} = '';
724 $checked{'TRANSPARENT_BLUE'}{'on'} = '';
725 $checked{'TRANSPARENT_BLUE'}{$proxysettings{'TRANSPARENT_BLUE'}} = "checked='checked'";
726
727 $checked{'FORWARD_IPADDRESS'}{'off'} = '';
728 $checked{'FORWARD_IPADDRESS'}{'on'} = '';
729 $checked{'FORWARD_IPADDRESS'}{$proxysettings{'FORWARD_IPADDRESS'}} = "checked='checked'";
730 $checked{'FORWARD_USERNAME'}{'off'} = '';
731 $checked{'FORWARD_USERNAME'}{'on'} = '';
732 $checked{'FORWARD_USERNAME'}{$proxysettings{'FORWARD_USERNAME'}} = "checked='checked'";
733 $checked{'FORWARD_VIA'}{'off'} = '';
734 $checked{'FORWARD_VIA'}{'on'} = '';
735 $checked{'FORWARD_VIA'}{$proxysettings{'FORWARD_VIA'}} = "checked='checked'";
736 $checked{'NO_CONNECTION_AUTH'}{'off'} = '';
737 $checked{'NO_CONNECTION_AUTH'}{'on'} = '';
738 $checked{'NO_CONNECTION_AUTH'}{$proxysettings{'NO_CONNECTION_AUTH'}} = "checked='checked'";
739
740 $selected{'MEM_POLICY'}{$proxysettings{'MEM_POLICY'}} = "selected='selected'";
741 $selected{'CACHE_POLICY'}{$proxysettings{'CACHE_POLICY'}} = "selected='selected'";
742 $selected{'L1_DIRS'}{$proxysettings{'L1_DIRS'}} = "selected='selected'";
743 $checked{'OFFLINE_MODE'}{'off'} = '';
744 $checked{'OFFLINE_MODE'}{'on'} = '';
745 $checked{'OFFLINE_MODE'}{$proxysettings{'OFFLINE_MODE'}} = "checked='checked'";
746 $checked{'CACHE_DIGESTS'}{'off'} = '';
747 $checked{'CACHE_DIGESTS'}{'on'} = '';
748 $checked{'CACHE_DIGESTS'}{$proxysettings{'CACHE_DIGESTS'}} = "checked='checked'";
749
750 $checked{'LOGGING'}{'off'} = '';
751 $checked{'LOGGING'}{'on'} = '';
752 $checked{'LOGGING'}{$proxysettings{'LOGGING'}} = "checked='checked'";
753 $checked{'CACHEMGR'}{'off'} = '';
754 $checked{'CACHEMGR'}{'on'} = '';
755 $checked{'CACHEMGR'}{$proxysettings{'CACHEMGR'}} = "checked='checked'";
756 $checked{'LOGQUERY'}{'off'} = '';
757 $checked{'LOGQUERY'}{'on'} = '';
758 $checked{'LOGQUERY'}{$proxysettings{'LOGQUERY'}} = "checked='checked'";
759 $checked{'LOGUSERAGENT'}{'off'} = '';
760 $checked{'LOGUSERAGENT'}{'on'} = '';
761 $checked{'LOGUSERAGENT'}{$proxysettings{'LOGUSERAGENT'}} = "checked='checked'";
762
763 $selected{'ERR_LANGUAGE'}{$proxysettings{'ERR_LANGUAGE'}} = "selected='selected'";
764 $selected{'ERR_DESIGN'}{$proxysettings{'ERR_DESIGN'}} = "selected='selected'";
765
766 $checked{'NO_PROXY_LOCAL'}{'off'} = '';
767 $checked{'NO_PROXY_LOCAL'}{'on'} = '';
768 $checked{'NO_PROXY_LOCAL'}{$proxysettings{'NO_PROXY_LOCAL'}} = "checked='checked'";
769 $checked{'NO_PROXY_LOCAL_BLUE'}{'off'} = '';
770 $checked{'NO_PROXY_LOCAL_BLUE'}{'on'} = '';
771 $checked{'NO_PROXY_LOCAL_BLUE'}{$proxysettings{'NO_PROXY_LOCAL_BLUE'}} = "checked='checked'";
772
773 $checked{'CLASSROOM_EXT'}{'off'} = '';
774 $checked{'CLASSROOM_EXT'}{'on'} = '';
775 $checked{'CLASSROOM_EXT'}{$proxysettings{'CLASSROOM_EXT'}} = "checked='checked'";
776
777 $selected{'TIME_ACCESS_MODE'}{$proxysettings{'TIME_ACCESS_MODE'}} = "selected='selected'";
778 $selected{'TIME_FROM_HOUR'}{$proxysettings{'TIME_FROM_HOUR'}} = "selected='selected'";
779 $selected{'TIME_FROM_MINUTE'}{$proxysettings{'TIME_FROM_MINUTE'}} = "selected='selected'";
780 $selected{'TIME_TO_HOUR'}{$proxysettings{'TIME_TO_HOUR'}} = "selected='selected'";
781 $selected{'TIME_TO_MINUTE'}{$proxysettings{'TIME_TO_MINUTE'}} = "selected='selected'";
782
783 $proxysettings{'TIME_MON'} = 'on' unless exists $proxysettings{'TIME_MON'};
784 $proxysettings{'TIME_TUE'} = 'on' unless exists $proxysettings{'TIME_TUE'};
785 $proxysettings{'TIME_WED'} = 'on' unless exists $proxysettings{'TIME_WED'};
786 $proxysettings{'TIME_THU'} = 'on' unless exists $proxysettings{'TIME_THU'};
787 $proxysettings{'TIME_FRI'} = 'on' unless exists $proxysettings{'TIME_FRI'};
788 $proxysettings{'TIME_SAT'} = 'on' unless exists $proxysettings{'TIME_SAT'};
789 $proxysettings{'TIME_SUN'} = 'on' unless exists $proxysettings{'TIME_SUN'};
790
791 $checked{'TIME_MON'}{'off'} = '';
792 $checked{'TIME_MON'}{'on'} = '';
793 $checked{'TIME_MON'}{$proxysettings{'TIME_MON'}} = "checked='checked'";
794 $checked{'TIME_TUE'}{'off'} = '';
795 $checked{'TIME_TUE'}{'on'} = '';
796 $checked{'TIME_TUE'}{$proxysettings{'TIME_TUE'}} = "checked='checked'";
797 $checked{'TIME_WED'}{'off'} = '';
798 $checked{'TIME_WED'}{'on'} = '';
799 $checked{'TIME_WED'}{$proxysettings{'TIME_WED'}} = "checked='checked'";
800 $checked{'TIME_THU'}{'off'} = '';
801 $checked{'TIME_THU'}{'on'} = '';
802 $checked{'TIME_THU'}{$proxysettings{'TIME_THU'}} = "checked='checked'";
803 $checked{'TIME_FRI'}{'off'} = '';
804 $checked{'TIME_FRI'}{'on'} = '';
805 $checked{'TIME_FRI'}{$proxysettings{'TIME_FRI'}} = "checked='checked'";
806 $checked{'TIME_SAT'}{'off'} = '';
807 $checked{'TIME_SAT'}{'on'} = '';
808 $checked{'TIME_SAT'}{$proxysettings{'TIME_SAT'}} = "checked='checked'";
809 $checked{'TIME_SUN'}{'off'} = '';
810 $checked{'TIME_SUN'}{'on'} = '';
811 $checked{'TIME_SUN'}{$proxysettings{'TIME_SUN'}} = "checked='checked'";
812
813 $selected{'THROTTLING_GREEN_TOTAL'}{$proxysettings{'THROTTLING_GREEN_TOTAL'}} = "selected='selected'";
814 $selected{'THROTTLING_GREEN_HOST'}{$proxysettings{'THROTTLING_GREEN_HOST'}} = "selected='selected'";
815 $selected{'THROTTLING_BLUE_TOTAL'}{$proxysettings{'THROTTLING_BLUE_TOTAL'}} = "selected='selected'";
816 $selected{'THROTTLING_BLUE_HOST'}{$proxysettings{'THROTTLING_BLUE_HOST'}} = "selected='selected'";
817
818 $checked{'ASNBL_FASTFLUX_DETECTION'}{'off'} = '';
819 $checked{'ASNBL_FASTFLUX_DETECTION'}{'on'} = '';
820 $checked{'ASNBL_FASTFLUX_DETECTION'}{$proxysettings{'ASNBL_FASTFLUX_DETECTION'}} = "checked='checked'";
821
822 $checked{'ASNBL_SELECANN_DETECTION'}{'off'} = '';
823 $checked{'ASNBL_SELECANN_DETECTION'}{'on'} = '';
824 $checked{'ASNBL_SELECANN_DETECTION'}{$proxysettings{'ASNBL_SELECANN_DETECTION'}} = "checked='checked'";
825
826 $checked{'ENABLE_MIME_FILTER'}{'off'} = '';
827 $checked{'ENABLE_MIME_FILTER'}{'on'} = '';
828 $checked{'ENABLE_MIME_FILTER'}{$proxysettings{'ENABLE_MIME_FILTER'}} = "checked='checked'";
829
830 $checked{'AUTH_METHOD'}{'none'} = '';
831 $checked{'AUTH_METHOD'}{'ncsa'} = '';
832 $checked{'AUTH_METHOD'}{'ident'} = '';
833 $checked{'AUTH_METHOD'}{'ldap'} = '';
834 $checked{'AUTH_METHOD'}{'ntlm-auth'} = '';
835 $checked{'AUTH_METHOD'}{'radius'} = '';
836 $checked{'AUTH_METHOD'}{$proxysettings{'AUTH_METHOD'}} = "checked='checked'";
837
838 $proxysettings{'AUTH_ALWAYS_REQUIRED'} = 'on' unless exists $proxysettings{'AUTH_ALWAYS_REQUIRED'};
839
840 $checked{'AUTH_ALWAYS_REQUIRED'}{'off'} = '';
841 $checked{'AUTH_ALWAYS_REQUIRED'}{'on'} = '';
842 $checked{'AUTH_ALWAYS_REQUIRED'}{$proxysettings{'AUTH_ALWAYS_REQUIRED'}} = "checked='checked'";
843
844 $checked{'NCSA_BYPASS_REDIR'}{'off'} = '';
845 $checked{'NCSA_BYPASS_REDIR'}{'on'} = '';
846 $checked{'NCSA_BYPASS_REDIR'}{$proxysettings{'NCSA_BYPASS_REDIR'}} = "checked='checked'";
847
848 $selected{'NCSA_GROUP'}{$proxysettings{'NCSA_GROUP'}} = "selected='selected'";
849
850 $selected{'LDAP_TYPE'}{$proxysettings{'LDAP_TYPE'}} = "selected='selected'";
851
852 $proxysettings{'NTLM_ENABLE_INT_AUTH'} = 'on' unless exists $proxysettings{'NTLM_ENABLE_INT_AUTH'};
853
854 $checked{'NTLM_ENABLE_INT_AUTH'}{'off'} = '';
855 $checked{'NTLM_ENABLE_INT_AUTH'}{'on'} = '';
856 $checked{'NTLM_ENABLE_INT_AUTH'}{$proxysettings{'NTLM_ENABLE_INT_AUTH'}} = "checked='checked'";
857
858 $checked{'NTLM_ENABLE_ACL'}{'off'} = '';
859 $checked{'NTLM_ENABLE_ACL'}{'on'} = '';
860 $checked{'NTLM_ENABLE_ACL'}{$proxysettings{'NTLM_ENABLE_ACL'}} = "checked='checked'";
861
862 $checked{'NTLM_USER_ACL'}{'positive'} = '';
863 $checked{'NTLM_USER_ACL'}{'negative'} = '';
864 $checked{'NTLM_USER_ACL'}{$proxysettings{'NTLM_USER_ACL'}} = "checked='checked'";
865
866 $checked{'NTLM_AUTH_BASIC'}{'on'} = '';
867 $checked{'NTLM_AUTH_BASIC'}{'off'} = '';
868 $checked{'NTLM_AUTH_BASIC'}{$proxysettings{'NTLM_AUTH_BASIC'}} = "checked='checked'";
869
870 $checked{'RADIUS_ENABLE_ACL'}{'off'} = '';
871 $checked{'RADIUS_ENABLE_ACL'}{'on'} = '';
872 $checked{'RADIUS_ENABLE_ACL'}{$proxysettings{'RADIUS_ENABLE_ACL'}} = "checked='checked'";
873
874 $checked{'RADIUS_USER_ACL'}{'positive'} = '';
875 $checked{'RADIUS_USER_ACL'}{'negative'} = '';
876 $checked{'RADIUS_USER_ACL'}{$proxysettings{'RADIUS_USER_ACL'}} = "checked='checked'";
877
878 $checked{'IDENT_REQUIRED'}{'off'} = '';
879 $checked{'IDENT_REQUIRED'}{'on'} = '';
880 $checked{'IDENT_REQUIRED'}{$proxysettings{'IDENT_REQUIRED'}} = "checked='checked'";
881
882 $checked{'IDENT_ENABLE_ACL'}{'off'} = '';
883 $checked{'IDENT_ENABLE_ACL'}{'on'} = '';
884 $checked{'IDENT_ENABLE_ACL'}{$proxysettings{'IDENT_ENABLE_ACL'}} = "checked='checked'";
885
886 $checked{'IDENT_USER_ACL'}{'positive'} = '';
887 $checked{'IDENT_USER_ACL'}{'negative'} = '';
888 $checked{'IDENT_USER_ACL'}{$proxysettings{'IDENT_USER_ACL'}} = "checked='checked'";
889
890 $checked{'ENABLE_FILTER'}{'off'} = '';
891 $checked{'ENABLE_FILTER'}{'on'} = '';
892 $checked{'ENABLE_FILTER'}{$proxysettings{'ENABLE_FILTER'}} = "checked='checked'";
893
894 $checked{'ENABLE_UPDXLRATOR'}{'off'} = '';
895 $checked{'ENABLE_UPDXLRATOR'}{'on'} = '';
896 $checked{'ENABLE_UPDXLRATOR'}{$proxysettings{'ENABLE_UPDXLRATOR'}} = "checked='checked'";
897
898 $checked{'ENABLE_CLAMAV'}{'off'} = '';
899 $checked{'ENABLE_CLAMAV'}{'on'} = '';
900 $checked{'ENABLE_CLAMAV'}{$proxysettings{'ENABLE_CLAMAV'}} = "checked='checked'";
901
902 &Header::openpage($Lang::tr{'advproxy advanced web proxy configuration'}, 1, '');
903
904 &Header::openbigbox('100%', 'left', '', $errormessage);
905
906 if ($errormessage) {
907 &Header::openbox('100%', 'left', $Lang::tr{'error messages'});
908 print "<font class='base'>$errormessage&nbsp;</font>\n";
909 &Header::closebox();
910 }
911
912 if ($squidversion[0] =~ /^Squid\sCache:\sVersion\s/i)
913 {
914 $squidversion[0] =~ s/^Squid\sCache:\sVersion//i;
915 $squidversion[0] =~ s/^\s+//g;
916 $squidversion[0] =~ s/\s+$//g;
917 } else {
918 $squidversion[0] = $Lang::tr{'advproxy unknown'};
919 }
920
921 # ===================================================================
922 # Main settings
923 # ===================================================================
924
925 unless ($proxysettings{'NCSA_EDIT_MODE'} eq 'yes') {
926
927 print "<form method='post' action='$ENV{'SCRIPT_NAME'}'>\n";
928
929 &Header::openbox('100%', 'left', "$Lang::tr{'advproxy advanced web proxy'}");
930
931 print <<END
932 <table width='100%'>
933 <tr>
934 <td colspan='4' class='base'><b>$Lang::tr{'advproxy common settings'}</b></td>
935 </tr>
936 <tr>
937 <td width='25%' class='base'>$Lang::tr{'advproxy enabled on'} <font color="$Header::colourgreen">Green</font>:</td>
938 <td width='20%'><input type='checkbox' name='ENABLE' $checked{'ENABLE'}{'on'} /></td>
939 <td width='25%' class='base'>$Lang::tr{'advproxy proxy port'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
940 <td width='30%'><input type='text' name='PROXY_PORT' value='$proxysettings{'PROXY_PORT'}' size='5' /></td>
941 </tr>
942 <tr>
943 <td class='base'>$Lang::tr{'advproxy transparent on'} <font color="$Header::colourgreen">Green</font>:</td>
944 <td><input type='checkbox' name='TRANSPARENT' $checked{'TRANSPARENT'}{'on'} /></td>
945 <td width='25%' class='base'>$Lang::tr{'advproxy proxy port transparent'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
946 <td width='30%'><input type='text' name='TRANSPARENT_PORT' value='$proxysettings{'TRANSPARENT_PORT'}' size='5' /></td>
947 </tr>
948 <tr>
949 END
950 ;
951 if ($netsettings{'BLUE_DEV'}) {
952 print "<td class='base'>$Lang::tr{'advproxy enabled on'} <font color='$Header::colourblue'>Blue</font>:</td>";
953 print "<td><input type='checkbox' name='ENABLE_BLUE' $checked{'ENABLE_BLUE'}{'on'} /></td>";
954 } else {
955 print "<td colspan='2'>&nbsp;</td>";
956 }
957 print <<END
958 <td class='base'>$Lang::tr{'advproxy visible hostname'}:</td>
959 <td><input type='text' name='VISIBLE_HOSTNAME' value='$proxysettings{'VISIBLE_HOSTNAME'}' /></td>
960 </tr>
961 <tr>
962 END
963 ;
964 if ($netsettings{'BLUE_DEV'}) {
965 print "<td class='base'>$Lang::tr{'advproxy transparent on'} <font color='$Header::colourblue'>Blue</font>:</td>";
966 print "<td><input type='checkbox' name='TRANSPARENT_BLUE' $checked{'TRANSPARENT_BLUE'}{'on'} /></td>";
967 } else {
968 print "<td colspan='2'>&nbsp;</td>";
969 }
970 print <<END
971 <td class='base'>$Lang::tr{'advproxy error language'}:</td>
972 <td class='base'>
973 <select name='ERR_LANGUAGE'>
974 END
975 ;
976 foreach (<$errordir/*>) {
977 if (-d) {
978 $language = substr($_,rindex($_,"/")+1);
979 print "<option value='$language' $selected{'ERR_LANGUAGE'}{$language}>$language</option>\n";
980 }
981 }
982 print <<END
983 </select>
984 </td>
985 </tr>
986 <tr>
987 <td>&nbsp;</td>
988 <td>&nbsp;</td>
989 <td class='base'>$Lang::tr{'advproxy error design'}:</td>
990 <td class='base'><select name='ERR_DESIGN'>
991 <option value='ipfire' $selected{'ERR_DESIGN'}{'ipfire'}>IPFire</option>
992 <option value='squid' $selected{'ERR_DESIGN'}{'squid'}>$Lang::tr{'advproxy standard'}</option>
993 </select></td>
994 </tr>
995 </table>
996 <hr size='1'>
997 <table width='100%'>
998 END
999 ;
1000 if ( -e "/usr/bin/squidclamav" ) {
1001 print "<td class='base'><b>".$Lang::tr{'advproxy squidclamav'}."</b><br />";
1002 if ( ! -e "/var/run/clamav/clamd.pid" ){
1003 print "<font color='red'>clamav not running</font><br /><br />";
1004 $proxysettings{'ENABLE_CLAMAV'} = 'off';
1005 }
1006 else {
1007 print $Lang::tr{'advproxy enabled'}."<input type='checkbox' name='ENABLE_CLAMAV' ".$checked{'ENABLE_CLAMAV'}{'on'}." /><br />";
1008 }
1009 print "</td>";
1010 } else {
1011 print "<td></td>";
1012 }
1013 print "<td class='base'><a href='/cgi-bin/urlfilter.cgi'><b>".$Lang::tr{'advproxy url filter'}."</a></b><br />";
1014 print $Lang::tr{'advproxy enabled'}."<input type='checkbox' name='ENABLE_FILTER' ".$checked{'ENABLE_FILTER'}{'on'}." /><br />";
1015 print "</td>";
1016 print "<td class='base'><a href='/cgi-bin/updatexlrator.cgi'><b>".$Lang::tr{'advproxy update accelerator'}."</a></b><br />";
1017 print $Lang::tr{'advproxy enabled'}."<input type='checkbox' name='ENABLE_UPDXLRATOR' ".$checked{'ENABLE_UPDXLRATOR'}{'on'}." /><br />";
1018 print "</td></tr>";
1019 print <<END
1020 </table>
1021 <hr size='1'>
1022 <table width='100%'>
1023 <tr>
1024 <td colspan='4' class='base'><b>$Lang::tr{'advproxy upstream proxy'}</b></td>
1025 </tr>
1026 <tr>
1027 <td width='25%' class='base'>$Lang::tr{'advproxy via forwarding'}:</td>
1028 <td width='20%'><input type='checkbox' name='FORWARD_VIA' $checked{'FORWARD_VIA'}{'on'} /></td>
1029 <td width='25%' class='base'>$Lang::tr{'advproxy upstream proxy host:port'}:</td>
1030 <td width='30%'><input type='text' name='UPSTREAM_PROXY' value='$proxysettings{'UPSTREAM_PROXY'}' /></td>
1031 </tr>
1032 <tr>
1033 <td class='base'>$Lang::tr{'advproxy client IP forwarding'}:</td>
1034 <td><input type='checkbox' name='FORWARD_IPADDRESS' $checked{'FORWARD_IPADDRESS'}{'on'} /></td>
1035 <td class='base'>$Lang::tr{'advproxy upstream username'}:</td>
1036 <td><input type='text' name='UPSTREAM_USER' value='$proxysettings{'UPSTREAM_USER'}' /></td>
1037 </tr>
1038 <tr>
1039 <td class='base'>$Lang::tr{'advproxy username forwarding'}:</td>
1040 <td><input type='checkbox' name='FORWARD_USERNAME' $checked{'FORWARD_USERNAME'}{'on'} /></td>
1041 <td class='base'>$Lang::tr{'advproxy upstream password'}:</td>
1042 <td><input type='password' name='UPSTREAM_PASSWORD' value='$proxysettings{'UPSTREAM_PASSWORD'}' /></td>
1043 </tr>
1044 <tr>
1045 <td class='base'>$Lang::tr{'advproxy no connection auth'}:</td>
1046 <td><input type='checkbox' name='NO_CONNECTION_AUTH' $checked{'NO_CONNECTION_AUTH'}{'on'} /></td>
1047 <td>&nbsp;</td>
1048 <td>&nbsp;</td>
1049 </tr>
1050 </table>
1051 <hr size='1'>
1052 <table width='100%'>
1053 <tr>
1054 <td colspan='4' class='base'><b>$Lang::tr{'advproxy log settings'}</b></td>
1055 </tr>
1056 <tr>
1057 <td width='25%' class='base'>$Lang::tr{'advproxy log enabled'}:</td>
1058 <td width='20%'><input type='checkbox' name='LOGGING' $checked{'LOGGING'}{'on'} /></td>
1059 <td width='25%'class='base'>$Lang::tr{'advproxy log query'}:</td>
1060 <td width='30%'><input type='checkbox' name='LOGQUERY' $checked{'LOGQUERY'}{'on'} /></td>
1061 </tr>
1062 <tr>
1063 <td>&nbsp;</td>
1064 <td>&nbsp;</td>
1065 <td class='base'>$Lang::tr{'advproxy log useragent'}:</td>
1066 <td><input type='checkbox' name='LOGUSERAGENT' $checked{'LOGUSERAGENT'}{'on'} /></td>
1067 </tr>
1068 </table>
1069 <hr size='1'>
1070 <table width='100%'>
1071 <tr>
1072 <td colspan='4'><b>$Lang::tr{'advproxy cache management'}</b></td>
1073 </tr>
1074 <tr>
1075 <td class='base'><a href='/cgi-bin/cachemgr.cgi' target='_blank'>$Lang::tr{'proxy cachemgr'}:</td>
1076 <td><input type='checkbox' name='CACHEMGR' $checked{'CACHEMGR'}{'on'} /></td>
1077 <td class='base'>$Lang::tr{'advproxy admin mail'}:</td>
1078 <td><input type='text' name='ADMIN_MAIL_ADDRESS' value='$proxysettings{'ADMIN_MAIL_ADDRESS'}' /></td>
1079 </tr>
1080 <tr>
1081 <td class='base'>$Lang::tr{'proxy filedescriptors'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1082 <td><input type='text' name='FILEDESCRIPTORS' value='$proxysettings{'FILEDESCRIPTORS'}' size='5' /></td>
1083 <td class='base'>$Lang::tr{'proxy admin password'}:</td>
1084 <td><input type='text' name='ADMIN_PASSWORD' value='$proxysettings{'ADMIN_PASSWORD'}' /></td>
1085 </tr>
1086 <tr>
1087 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1088 </tr>
1089 <tr>
1090 <td class='base'>$Lang::tr{'advproxy ram cache size'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1091 <td><input type='text' name='CACHE_MEM' value='$proxysettings{'CACHE_MEM'}' size='5' /></td>
1092 <td class='base'>$Lang::tr{'advproxy hdd cache size'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1093 <td><input type='text' name='CACHE_SIZE' value='$proxysettings{'CACHE_SIZE'}' size='5' /></td>
1094 </tr>
1095 <tr>
1096 <td class='base'>$Lang::tr{'advproxy min size'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1097 <td><input type='text' name='MIN_SIZE' value='$proxysettings{'MIN_SIZE'}' size='5' /></td>
1098 <td class='base'>$Lang::tr{'advproxy max size'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1099 <td><input type='text' name='MAX_SIZE' value='$proxysettings{'MAX_SIZE'}' size='5' /></td>
1100 </tr>
1101 <tr>
1102 <td class='base'>$Lang::tr{'advproxy number of L1 dirs'}:</td>
1103 <td class='base'><select name='L1_DIRS'>
1104 <option value='16' $selected{'L1_DIRS'}{'16'}>16</option>
1105 <option value='32' $selected{'L1_DIRS'}{'32'}>32</option>
1106 <option value='64' $selected{'L1_DIRS'}{'64'}>64</option>
1107 <option value='128' $selected{'L1_DIRS'}{'128'}>128</option>
1108 <option value='256' $selected{'L1_DIRS'}{'256'}>256</option>
1109 </select></td>
1110 <td colspan='2' rowspan= '5' valign='top' class='base'>
1111 <table cellspacing='0' cellpadding='0'>
1112 <tr>
1113 <!-- intentionally left empty -->
1114 </tr>
1115 <tr>
1116 <td>$Lang::tr{'advproxy no cache sites'}:</td>
1117 </tr>
1118 <tr>
1119 <!-- intentionally left empty -->
1120 </tr>
1121 <tr>
1122 <!-- intentionally left empty -->
1123 </tr>
1124 <tr>
1125 <td><textarea name='DST_NOCACHE' cols='32' rows='6' wrap='off'>
1126 END
1127 ;
1128
1129 print $proxysettings{'DST_NOCACHE'};
1130
1131 print <<END
1132 </textarea></td>
1133 </tr>
1134 </table>
1135 </td>
1136 </tr>
1137 <tr>
1138 <td class='base'>$Lang::tr{'advproxy memory replacement policy'}:</td>
1139 <td class='base'><select name='MEM_POLICY'>
1140 <option value='LRU' $selected{'MEM_POLICY'}{'LRU'}>LRU</option>
1141 <option value='heap LFUDA' $selected{'MEM_POLICY'}{'heap LFUDA'}>heap LFUDA</option>
1142 <option value='heap GDSF' $selected{'MEM_POLICY'}{'heap GDSF'}>heap GDSF</option>
1143 <option value='heap LRU' $selected{'MEM_POLICY'}{'heap LRU'}>heap LRU</option>
1144 </select></td>
1145 </tr>
1146 <tr>
1147 <td class='base'>$Lang::tr{'advproxy cache replacement policy'}:</td>
1148 <td class='base'><select name='CACHE_POLICY'>
1149 <option value='LRU' $selected{'CACHE_POLICY'}{'LRU'}>LRU</option>
1150 <option value='heap LFUDA' $selected{'CACHE_POLICY'}{'heap LFUDA'}>heap LFUDA</option>
1151 <option value='heap GDSF' $selected{'CACHE_POLICY'}{'heap GDSF'}>heap GDSF</option>
1152 <option value='heap LRU' $selected{'CACHE_POLICY'}{'heap LRU'}>heap LRU</option>
1153 </select></td>
1154 </tr>
1155 <tr>
1156 <td colspan='2'>&nbsp;</td>
1157 </tr>
1158 <tr>
1159 <td class='base'>$Lang::tr{'advproxy offline mode'}:</td>
1160 <td><input type='checkbox' name='OFFLINE_MODE' $checked{'OFFLINE_MODE'}{'on'} /></td>
1161 </tr>
1162 <tr>
1163 <td class='base'>$Lang::tr{'advproxy cache-digest'}:</td>
1164 <td><input type='checkbox' name='CACHE_DIGESTS' $checked{'CACHE_DIGESTS'}{'on'} /></td>
1165 </tr>
1166 </table>
1167 <hr size='1'>
1168 <table width='100%'>
1169 <tr>
1170 <td colspan='4'><b>$Lang::tr{'advproxy destination ports'}</b></td>
1171 </tr>
1172 <tr>
1173 <td width='25%' align='center'></td> <td width='20%' align='center'></td><td width='25%' align='center'></td><td width='30%' align='center'></td>
1174 </tr>
1175 <tr>
1176 <td colspan='2' class='base'>$Lang::tr{'advproxy standard ports'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1177 <td colspan='2' class='base'>$Lang::tr{'advproxy ssl ports'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1178 </tr>
1179 <tr>
1180 <td colspan='2'><textarea name='PORTS_SAFE' cols='32' rows='6' wrap='off'>
1181 END
1182 ;
1183 if (!$proxysettings{'PORTS_SAFE'}) { print $def_ports_safe; } else { print $proxysettings{'PORTS_SAFE'}; }
1184
1185 print <<END
1186 </textarea></td>
1187 <td colspan='2'><textarea name='PORTS_SSL' cols='32' rows='6' wrap='off'>
1188 END
1189 ;
1190 if (!$proxysettings{'PORTS_SSL'}) { print $def_ports_ssl; } else { print $proxysettings{'PORTS_SSL'}; }
1191
1192 print <<END
1193 </textarea></td>
1194 </tr>
1195 </table>
1196 <hr size='1'>
1197 <table width='100%'>
1198 <tr>
1199 <td colspan='4'><b>$Lang::tr{'advproxy network based access'}</b></td>
1200 </tr>
1201 <tr>
1202 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1203 </tr>
1204 <tr>
1205 <td colspan='4' class='base'>$Lang::tr{'advproxy allowed subnets'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1206 </tr>
1207 <tr>
1208 <td colspan='2' rowspan='4'><textarea name='SRC_SUBNETS' cols='32' rows='3' wrap='off'>
1209 END
1210 ;
1211
1212 if (!$proxysettings{'SRC_SUBNETS'})
1213 {
1214 if (&Header::green_used()) {
1215 print "$green_cidr\n";
1216 }
1217
1218 if (&Header::blue_used()) {
1219 print "$blue_cidr\n";
1220 }
1221 } else { print $proxysettings{'SRC_SUBNETS'}; }
1222
1223 print <<END
1224 </textarea></td>
1225 END
1226 ;
1227
1228 $line = $Lang::tr{'advproxy no internal proxy on green'};
1229 $line =~ s/Green/<font color="$Header::colourgreen">Green<\/font>/i;
1230 print "<td class='base'>$line:</td>\n";
1231 print <<END
1232 <td><input type='checkbox' name='NO_PROXY_LOCAL' $checked{'NO_PROXY_LOCAL'}{'on'} /></td>
1233 </tr>
1234 END
1235 ;
1236 if ($netsettings{'BLUE_DEV'}) {
1237 $line = $Lang::tr{'advproxy no internal proxy on blue'};
1238 $line =~ s/Blue/<font color="$Header::colourblue">Blue<\/font>/i;
1239 print "<tr>\n";
1240 print "<td class='base'>$line:</td>\n";
1241 print <<END
1242 <td><input type='checkbox' name='NO_PROXY_LOCAL_BLUE' $checked{'NO_PROXY_LOCAL_BLUE'}{'on'} /></td>
1243 </tr>
1244 END
1245 ;
1246 }
1247 print <<END
1248 <tr>
1249 <td colspan='2'>&nbsp;</td>
1250 </tr>
1251 <tr>
1252 <td colspan='2'>&nbsp;</td>
1253 </tr>
1254 </table>
1255 <table width='100%'>
1256 <tr>
1257 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1258 </tr>
1259 <tr>
1260 <td colspan='2' class='base'>$Lang::tr{'advproxy unrestricted ip clients'}:</td>
1261 <td colspan='2' class='base'>$Lang::tr{'advproxy unrestricted mac clients'}:</td>
1262 </tr>
1263 <tr>
1264 <td colspan='2'><textarea name='SRC_UNRESTRICTED_IP' cols='32' rows='3' wrap='off'>
1265 END
1266 ;
1267
1268 print $proxysettings{'SRC_UNRESTRICTED_IP'};
1269
1270 print <<END
1271 </textarea></td>
1272 <td colspan='2'><textarea name='SRC_UNRESTRICTED_MAC' cols='32' rows='3' wrap='off'>
1273 END
1274 ;
1275
1276 print $proxysettings{'SRC_UNRESTRICTED_MAC'};
1277
1278 print <<END
1279 </textarea></td>
1280 </tr>
1281 </table>
1282 <table width='100%'>
1283 <tr>
1284 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1285 </tr>
1286 <tr>
1287 <td colspan='2' class='base'>$Lang::tr{'advproxy banned ip clients'}:</td>
1288 <td colspan='2' class='base'>$Lang::tr{'advproxy banned mac clients'}:</td>
1289 </tr>
1290 <tr>
1291 <td colspan='2'><textarea name='SRC_BANNED_IP' cols='32' rows='3' wrap='off'>
1292 END
1293 ;
1294
1295 print $proxysettings{'SRC_BANNED_IP'};
1296
1297 print <<END
1298 </textarea></td>
1299 <td colspan='2'><textarea name='SRC_BANNED_MAC' cols='32' rows='3' wrap='off'>
1300 END
1301 ;
1302
1303 print $proxysettings{'SRC_BANNED_MAC'};
1304
1305 print <<END
1306 </textarea></td>
1307 </tr>
1308 </table>
1309
1310 <hr size='1'>
1311
1312 END
1313 ;
1314 # -------------------------------------------------------------------
1315 # CRE GUI - optional
1316 # -------------------------------------------------------------------
1317
1318 if (-e $cre_enabled) { print <<END
1319 <table width='100%'>
1320
1321 <tr>
1322 <td colspan='4'><b>$Lang::tr{'advproxy classroom extensions'}</b> $Lang::tr{'advproxy enabled'}:<input type='checkbox' name='CLASSROOM_EXT' $checked{'CLASSROOM_EXT'}{'on'} /></td>
1323 </tr>
1324 <tr>
1325 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1326 </tr>
1327 <tr>
1328
1329 END
1330 ;
1331 if ($proxysettings{'CLASSROOM_EXT'} eq 'on'){
1332 print <<END
1333 <td class='base'>$Lang::tr{'advproxy supervisor password'}:</td>
1334 <td><input type='password' name='SUPERVISOR_PASSWORD' value='$proxysettings{'SUPERVISOR_PASSWORD'}' size='12' /></td>
1335 </tr>
1336 <tr>
1337 <td colspan='2' class='base'>$Lang::tr{'advproxy cre group definitions'}:</td>
1338 <td colspan='2' class='base'>$Lang::tr{'advproxy cre supervisors'}:</td>
1339 END
1340 ;
1341 }
1342 print "</tr>";
1343 if ($proxysettings{'CLASSROOM_EXT'} eq 'on'){
1344 print <<END
1345 <tr>
1346 <td colspan='2'><textarea name='CRE_GROUPS' cols='32' rows='6' wrap='off'>
1347 END
1348 ;
1349
1350 print $proxysettings{'CRE_GROUPS'};
1351
1352 print <<END
1353 </textarea></td>
1354 <td colspan='2'><textarea name='CRE_SVHOSTS' cols='32' rows='6' wrap='off'>
1355 END
1356 ;
1357 print $proxysettings{'CRE_SVHOSTS'};
1358
1359 print <<END
1360 </textarea></td>
1361 </tr>
1362 END
1363 ;
1364 }
1365 print "</table><hr size='1'>";
1366
1367 } else {
1368 print <<END
1369 <input type='hidden' name='SUPERVISOR_PASSWORD' value='$proxysettings{'SUPERVISOR_PASSWORD'}' />
1370 <input type='hidden' name='CRE_GROUPS' value='$proxysettings{'CRE_GROUPS'}' />
1371 <input type='hidden' name='CRE_SVHOSTS' value='$proxysettings{'CRE_SVHOSTS'}' />
1372 END
1373 ;
1374 }
1375
1376 # ===================================================================
1377 # WPAD settings
1378 # ===================================================================
1379
1380 print <<END
1381 <table width='100%'>
1382 <tr>
1383 <td colspan='4'><b>$Lang::tr{'advproxy wpad title'}</b></td>
1384 </tr>
1385 <tr>
1386 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1387 </tr>
1388 <tr>
1389 <td colspan='2' class='base'>$Lang::tr{'advproxy wpad label dst_noproxy_ip'}:</td>
1390 <td colspan='2' class='base'>$Lang::tr{'advproxy wpad label dst_noproxy_url'}:</td>
1391 </tr>
1392 <tr>
1393 <td colspan='2'><textarea name='DST_NOPROXY_IP' cols='32' rows='3' wrap='off'>
1394 END
1395 ;
1396
1397 print $proxysettings{'DST_NOPROXY_IP'};
1398
1399 print <<END
1400 </textarea></td>
1401
1402 <td colspan='2'><textarea name='DST_NOPROXY_URL' cols='32' rows='3' wrap='off'>
1403 END
1404 ;
1405
1406 print $proxysettings{'DST_NOPROXY_URL'};
1407
1408 print <<END
1409 </textarea></td>
1410 </tr>
1411 <tr>
1412 <td colspan='2' class='base'>$Lang::tr{'advproxy wpad example dst_noproxy_ip'}</td>
1413 <td colspan='2' class='base'>$Lang::tr{'advproxy wpad example dst_noproxy_url'}</td>
1414 </tr>
1415 <tr>
1416 <td colspan="4">&nbsp;</td>
1417 </tr>
1418 <tr>
1419 <td colspan="4">$Lang::tr{'advproxy wpad view pac'}: <a href="http://$ENV{SERVER_ADDR}:81/wpad.dat" target="_blank">http://$ENV{SERVER_ADDR}:81/wpad.dat</a></td>
1420 </tr>
1421 <tr>
1422 <td colspan="4">&nbsp;</td>
1423 </tr>
1424 </table>
1425
1426 <hr size='1'>
1427
1428 END
1429 ;
1430
1431 # -------------------------------------------------------------------
1432
1433 print <<END
1434
1435 <table width='100%'>
1436 <tr>
1437 <td colspan='4'><b>$Lang::tr{'advproxy time restrictions'}</b></td>
1438 </tr>
1439 <table width='100%'>
1440 <tr>
1441 <td width='2%'>$Lang::tr{'advproxy access'}</td>
1442 <td width='1%'>&nbsp;</td>
1443 <td width='2%' align='center'>$Lang::tr{'advproxy monday'}</td>
1444 <td width='2%' align='center'>$Lang::tr{'advproxy tuesday'}</td>
1445 <td width='2%' align='center'>$Lang::tr{'advproxy wednesday'}</td>
1446 <td width='2%' align='center'>$Lang::tr{'advproxy thursday'}</td>
1447 <td width='2%' align='center'>$Lang::tr{'advproxy friday'}</td>
1448 <td width='2%' align='center'>$Lang::tr{'advproxy saturday'}</td>
1449 <td width='2%' align='center'>$Lang::tr{'advproxy sunday'}</td>
1450 <td width='1%'>&nbsp;&nbsp;</td>
1451 <td width='7%' colspan=3>$Lang::tr{'advproxy from'}</td>
1452 <td width='1%'>&nbsp;</td>
1453 <td width='7%' colspan=3>$Lang::tr{'advproxy to'}</td>
1454 <td>&nbsp;</td>
1455 </tr>
1456 <tr>
1457 <td class='base'>
1458 <select name='TIME_ACCESS_MODE'>
1459 <option value='allow' $selected{'TIME_ACCESS_MODE'}{'allow'}>$Lang::tr{'advproxy mode allow'}</option>
1460 <option value='deny' $selected{'TIME_ACCESS_MODE'}{'deny'}>$Lang::tr{'advproxy mode deny'}</option>
1461 </select>
1462 </td>
1463 <td>&nbsp;</td>
1464 <td class='base'><input type='checkbox' name='TIME_MON' $checked{'TIME_MON'}{'on'} /></td>
1465 <td class='base'><input type='checkbox' name='TIME_TUE' $checked{'TIME_TUE'}{'on'} /></td>
1466 <td class='base'><input type='checkbox' name='TIME_WED' $checked{'TIME_WED'}{'on'} /></td>
1467 <td class='base'><input type='checkbox' name='TIME_THU' $checked{'TIME_THU'}{'on'} /></td>
1468 <td class='base'><input type='checkbox' name='TIME_FRI' $checked{'TIME_FRI'}{'on'} /></td>
1469 <td class='base'><input type='checkbox' name='TIME_SAT' $checked{'TIME_SAT'}{'on'} /></td>
1470 <td class='base'><input type='checkbox' name='TIME_SUN' $checked{'TIME_SUN'}{'on'} /></td>
1471 <td>&nbsp;</td>
1472 <td class='base'>
1473 <select name='TIME_FROM_HOUR'>
1474 END
1475 ;
1476 for ($i=0;$i<=24;$i++) {
1477 $_ = sprintf("%02s",$i);
1478 print "<option $selected{'TIME_FROM_HOUR'}{$_}>$_</option>\n";
1479 }
1480 print <<END
1481 </select>
1482 </td>
1483 <td>:</td>
1484 <td class='base'>
1485 <select name='TIME_FROM_MINUTE'>
1486 END
1487 ;
1488 for ($i=0;$i<=45;$i+=15) {
1489 $_ = sprintf("%02s",$i);
1490 print "<option $selected{'TIME_FROM_MINUTE'}{$_}>$_</option>\n";
1491 }
1492 print <<END
1493 </select>
1494 <td> - </td>
1495 </td>
1496 <td class='base'>
1497 <select name='TIME_TO_HOUR'>
1498 END
1499 ;
1500 for ($i=0;$i<=24;$i++) {
1501 $_ = sprintf("%02s",$i);
1502 print "<option $selected{'TIME_TO_HOUR'}{$_}>$_</option>\n";
1503 }
1504 print <<END
1505 </select>
1506 </td>
1507 <td>:</td>
1508 <td class='base'>
1509 <select name='TIME_TO_MINUTE'>
1510 END
1511 ;
1512 for ($i=0;$i<=45;$i+=15) {
1513 $_ = sprintf("%02s",$i);
1514 print "<option $selected{'TIME_TO_MINUTE'}{$_}>$_</option>\n";
1515 }
1516 print <<END
1517 </select>
1518 </td>
1519 </tr>
1520 </table>
1521 <hr size='1'>
1522 <table width='100%'>
1523 <tr>
1524 <td colspan='4'><b>$Lang::tr{'advproxy transfer limits'}</b></td>
1525 </tr>
1526 <tr>
1527 <td width='25%' class='base'>$Lang::tr{'advproxy max download size'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1528 <td width='20%'><input type='text' name='MAX_INCOMING_SIZE' value='$proxysettings{'MAX_INCOMING_SIZE'}' size='5' /></td>
1529 <td width='25%' class='base'>$Lang::tr{'advproxy max upload size'}:&nbsp;<img src='/blob.gif' alt='*' /></td>
1530 <td width='30%'><input type='text' name='MAX_OUTGOING_SIZE' value='$proxysettings{'MAX_OUTGOING_SIZE'}' size='5' /></td>
1531 </tr>
1532 </table>
1533 <hr size='1'>
1534 <table width='100%'>
1535 <tr>
1536 <td colspan='4'><b>$Lang::tr{'advproxy download throttling'}</b></td>
1537 </tr>
1538 <tr>
1539 <td width='25%' class='base'>$Lang::tr{'advproxy throttling total on'} <font color="$Header::colourgreen">Green</font>:</td>
1540 <td width='20%' class='base'>
1541 <select name='THROTTLING_GREEN_TOTAL'>
1542 END
1543 ;
1544
1545 foreach (@throttle_limits) {
1546 my $val = $_;
1547 my $unit = "kbit/s";
1548
1549 if ($val >= 1024) {
1550 $unit = "Mbit/s";
1551 $val /= 1024;
1552 }
1553
1554 print "\t<option value='$_' $selected{'THROTTLING_GREEN_TOTAL'}{$_}>$val $unit</option>\n";
1555 }
1556
1557 print <<END
1558 <option value='0' $selected{'THROTTLING_GREEN_TOTAL'}{'unlimited'}>$Lang::tr{'advproxy throttling unlimited'}</option>\n";
1559 </select>
1560 </td>
1561 <td width='25%' class='base'>$Lang::tr{'advproxy throttling per host on'} <font color="$Header::colourgreen">Green</font>:</td>
1562 <td width='30%' class='base'>
1563 <select name='THROTTLING_GREEN_HOST'>
1564 END
1565 ;
1566
1567 foreach (@throttle_limits) {
1568 print "\t<option value='$_' $selected{'THROTTLING_GREEN_HOST'}{$_}>$_ kbit/s</option>\n";
1569 }
1570
1571 print <<END
1572 <option value='0' $selected{'THROTTLING_GREEN_HOST'}{'unlimited'}>$Lang::tr{'advproxy throttling unlimited'}</option>\n";
1573 </select>
1574 </td>
1575 </tr>
1576 END
1577 ;
1578
1579 if ($netsettings{'BLUE_DEV'}) {
1580 print <<END
1581 <tr>
1582 <td class='base'>$Lang::tr{'advproxy throttling total on'} <font color="$Header::colourblue">Blue</font>:</td>
1583 <td class='base'>
1584 <select name='THROTTLING_BLUE_TOTAL'>
1585 END
1586 ;
1587
1588 foreach (@throttle_limits) {
1589 print "\t<option value='$_' $selected{'THROTTLING_BLUE_TOTAL'}{$_}>$_ kbit/s</option>\n";
1590 }
1591
1592 print <<END
1593 <option value='0' $selected{'THROTTLING_BLUE_TOTAL'}{'unlimited'}>$Lang::tr{'advproxy throttling unlimited'}</option>\n";
1594 </select>
1595 </td>
1596 <td class='base'>$Lang::tr{'advproxy throttling per host on'} <font color="$Header::colourblue">Blue</font>:</td>
1597 <td class='base'>
1598 <select name='THROTTLING_BLUE_HOST'>
1599 END
1600 ;
1601
1602 foreach (@throttle_limits) {
1603 print "\t<option value='$_' $selected{'THROTTLING_BLUE_HOST'}{$_}>$_ kbit/s</option>\n";
1604 }
1605
1606 print <<END
1607 <option value='0' $selected{'THROTTLING_BLUE_HOST'}{'unlimited'}>$Lang::tr{'advproxy throttling unlimited'}</option>\n";
1608 </select>
1609 </td>
1610 </tr>
1611 END
1612 ;
1613 }
1614
1615 print <<END
1616 </table>
1617 <hr size='1'>
1618 <table width='100%'>
1619 <tr>
1620 <td colspan='4'><b>$Lang::tr{'advproxy MIME filter'}</b> $Lang::tr{'advproxy enabled'}:<input type='checkbox' name='ENABLE_MIME_FILTER' $checked{'ENABLE_MIME_FILTER'}{'on'} /></td>
1621 </tr>
1622 END
1623 ;
1624 if ( $proxysettings{'ENABLE_MIME_FILTER'} eq 'on' ){
1625 print <<END
1626 <tr>
1627 <td colspan='2' class='base'>$Lang::tr{'advproxy MIME block types'}:</td>
1628 <td>&nbsp;</td>
1629 <td>&nbsp;</td>
1630 </tr>
1631 <tr>
1632 <td colspan='2'><textarea name='MIME_TYPES' cols='32' rows='6' wrap='off'>
1633 END
1634 ;
1635
1636 print $proxysettings{'MIME_TYPES'};
1637
1638 print <<END
1639 </textarea></td>
1640 <td>&nbsp;</td>
1641 <td>&nbsp;</td>
1642 </tr>
1643 END
1644 ;
1645 }
1646 print <<END
1647 </table>
1648
1649 <hr size='1'>
1650
1651 <table width='100%'>
1652 <tr>
1653 <td><b>$Lang::tr{'advproxy asbased anomaly detection'}</b></td>
1654 </tr>
1655 <tr>
1656 <td class='base'>$Lang::tr{'advproxy fastflux detection'}:</td>
1657 <td><input type='checkbox' name='ASNBL_FASTFLUX_DETECTION' $checked{'ASNBL_FASTFLUX_DETECTION'}{'on'} /></td>
1658 <td class='base'>$Lang::tr{'advproxy fastflux detection threshold'}:</td>
1659 <td><input type='text' name='ASNBL_FASTFLUX_THRESHOLD' value='$proxysettings{'ASNBL_FASTFLUX_THRESHOLD'}' size=2 /></td>
1660 </tr>
1661 <tr>
1662 <td class='base'>$Lang::tr{'advproxy selectively announcements detection'}:</td>
1663 <td colspan='3'><input type='checkbox' name='ASNBL_SELECANN_DETECTION' $checked{'ASNBL_SELECANN_DETECTION'}{'on'} /></td>
1664 </tr>
1665 </table>
1666
1667 <hr size='1'>
1668 END
1669 ;
1670
1671 my $auth_columns = 5;
1672 if ($HAVE_NTLM_AUTH) {
1673 $auth_columns++;
1674 }
1675 my $auth_column_width = 100 / $auth_columns;
1676
1677 print <<END;
1678 <table width='100%'>
1679 <tr>
1680 <td colspan='$auth_columns'><b>$Lang::tr{'advproxy AUTH method'}</b></td>
1681 </tr>
1682 <tr>
1683 <td width='$auth_column_width%' class='base'><input type='radio' name='AUTH_METHOD' value='none' $checked{'AUTH_METHOD'}{'none'} />$Lang::tr{'advproxy AUTH method none'}</td>
1684 <td width='$auth_column_width%' class='base'><input type='radio' name='AUTH_METHOD' value='ncsa' $checked{'AUTH_METHOD'}{'ncsa'} />$Lang::tr{'advproxy AUTH method ncsa'}</td>
1685 <td width='$auth_column_width%' class='base'><input type='radio' name='AUTH_METHOD' value='ident' $checked{'AUTH_METHOD'}{'ident'} />$Lang::tr{'advproxy AUTH method ident'}</td>
1686 <td width='$auth_column_width%' class='base'><input type='radio' name='AUTH_METHOD' value='ldap' $checked{'AUTH_METHOD'}{'ldap'} />$Lang::tr{'advproxy AUTH method ldap'}</td>
1687 END
1688
1689 if ($HAVE_NTLM_AUTH) {
1690 print <<END;
1691 <td width='$auth_column_width%' class='base'><input type='radio' name='AUTH_METHOD' value='ntlm-auth' $checked{'AUTH_METHOD'}{'ntlm-auth'} />$Lang::tr{'advproxy AUTH method ntlm auth'}</td>
1692 END
1693 }
1694
1695 print <<END
1696 <td width='$auth_column_width%' class='base'><input type='radio' name='AUTH_METHOD' value='radius' $checked{'AUTH_METHOD'}{'radius'} />$Lang::tr{'advproxy AUTH method radius'}</td>
1697 </tr>
1698 </table>
1699 END
1700 ;
1701
1702 if (!($proxysettings{'AUTH_METHOD'} eq 'none')) { if (!($proxysettings{'AUTH_METHOD'} eq 'ident')) { print <<END
1703 <hr size='1'>
1704 <table width='100%'>
1705 <tr>
1706 <td colspan='4'><b>$Lang::tr{'advproxy AUTH global settings'}</b></td>
1707 </tr>
1708 <tr>
1709 <td width='25%'></td> <td width='20%'> </td><td width='25%'> </td><td width='30%'></td>
1710 </tr>
1711 <tr>
1712 <td class='base'>$Lang::tr{'advproxy AUTH number of auth processes'}:</td>
1713 <td><input type='text' name='AUTH_CHILDREN' value='$proxysettings{'AUTH_CHILDREN'}' size='5' /></td>
1714 <td colspan='2' rowspan= '6' valign='top' class='base'>
1715 <table cellpadding='0' cellspacing='0'>
1716 <tr>
1717 <td class='base'>$Lang::tr{'advproxy AUTH realm'}:</td>
1718 </tr>
1719 <tr>
1720 <!-- intentionally left empty -->
1721 </tr>
1722 <tr>
1723 <!-- intentionally left empty -->
1724 </tr>
1725 <tr>
1726 <td><input type='text' name='AUTH_REALM' value='$proxysettings{'AUTH_REALM'}' size='40' /></td>
1727 </tr>
1728 <tr>
1729 <!-- intentionally left empty -->
1730 </tr>
1731 <tr>
1732 <!-- intentionally left empty -->
1733 </tr>
1734 <tr>
1735 <td>$Lang::tr{'advproxy AUTH no auth'}:</td>
1736 </tr>
1737 <tr>
1738 <!-- intentionally left empty -->
1739 </tr>
1740 <tr>
1741 <!-- intentionally left empty -->
1742 </tr>
1743 <tr>
1744 <td><textarea name='DST_NOAUTH' cols='32' rows='6' wrap='off'>
1745 END
1746 ;
1747
1748 print $proxysettings{'DST_NOAUTH'};
1749
1750 print <<END
1751 </textarea></td>
1752 </tr>
1753 </table>
1754 </td>
1755 </tr>
1756 <tr>
1757 <td class='base'>$Lang::tr{'advproxy AUTH auth cache TTL'}:</td>
1758 <td><input type='text' name='AUTH_CACHE_TTL' value='$proxysettings{'AUTH_CACHE_TTL'}' size='5' /></td>
1759 </tr>
1760 <tr>
1761 <td class='base'>$Lang::tr{'advproxy AUTH limit of IP addresses'}:</td>
1762 <td><input type='text' name='AUTH_MAX_USERIP' value='$proxysettings{'AUTH_MAX_USERIP'}' size='5' /></td>
1763 </tr>
1764 <tr>
1765 <td class='base'>$Lang::tr{'advproxy AUTH user IP cache TTL'}:</td>
1766 <td><input type='text' name='AUTH_IPCACHE_TTL' value='$proxysettings{'AUTH_IPCACHE_TTL'}' size='5' /></td>
1767 </tr>
1768 <tr>
1769 <td class='base'>$Lang::tr{'advproxy AUTH always required'}:</td>
1770 <td><input type='checkbox' name='AUTH_ALWAYS_REQUIRED' $checked{'AUTH_ALWAYS_REQUIRED'}{'on'} /></td>
1771 </tr>
1772 <tr>
1773 <td colspan='2'>&nbsp;</td>
1774 </tr>
1775 </table>
1776 END
1777 ;
1778 }
1779
1780 # ===================================================================
1781 # NCSA auth settings
1782 # ===================================================================
1783
1784 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa') {
1785 print <<END
1786 <hr size='1'>
1787 <table width='100%'>
1788 <tr>
1789 <td colspan='4'><b>$Lang::tr{'advproxy NCSA auth'}</b></td>
1790 </tr>
1791 <tr>
1792 <td width='25%' class='base'>$Lang::tr{'advproxy NCSA min password length'}:</td>
1793 <td width='20%'><input type='text' name='NCSA_MIN_PASS_LEN' value='$proxysettings{'NCSA_MIN_PASS_LEN'}' size='5' /></td>
1794 <td width='25%' class='base'>$Lang::tr{'advproxy NCSA redirector bypass'} \'$Lang::tr{'advproxy NCSA grp extended'}\':</td>
1795 <td width='20%'><input type='checkbox' name='NCSA_BYPASS_REDIR' $checked{'NCSA_BYPASS_REDIR'}{'on'} /></td>
1796 </tr>
1797 <tr>
1798 <td colspan='2'><br>&nbsp;<input type='submit' name='ACTION' value='$Lang::tr{'advproxy NCSA user management'}'></td>
1799 <td>&nbsp;</td>
1800 <td>&nbsp;</td>
1801 </tr>
1802 </table>
1803 END
1804 ; }
1805
1806 # ===================================================================
1807 # IDENTD auth settings
1808 # ===================================================================
1809
1810 if ($proxysettings{'AUTH_METHOD'} eq 'ident') {
1811 print <<END
1812 <hr size ='1'>
1813 <table width='100%'>
1814 <tr>
1815 <td colspan='4'><b>$Lang::tr{'advproxy IDENT identd settings'}</b></td>
1816 </tr>
1817 <tr>
1818 <td width='25%' class='base'>$Lang::tr{'advproxy IDENT required'}:</td>
1819 <td width='20%'><input type='checkbox' name='IDENT_REQUIRED' $checked{'IDENT_REQUIRED'}{'on'} /></td>
1820 <td width='25%' class='base'>$Lang::tr{'advproxy AUTH always required'}:</td>
1821 <td width='30%'><input type='checkbox' name='AUTH_ALWAYS_REQUIRED' $checked{'AUTH_ALWAYS_REQUIRED'}{'on'} /></td>
1822 </tr>
1823 <tr>
1824 <td class='base'>$Lang::tr{'advproxy IDENT timeout'}:</td>
1825 <td><input type='text' name='IDENT_TIMEOUT' value='$proxysettings{'IDENT_TIMEOUT'}' size='5' /></td>
1826 <td>&nbsp;</td>
1827 <td>&nbsp;</td>
1828 </tr>
1829 <tr>
1830 <td colspan='2' class='base'>$Lang::tr{'advproxy IDENT aware hosts'}:</td>
1831 <td colspan='2' class='base'>$Lang::tr{'advproxy AUTH no auth'}:</td>
1832 </tr>
1833 <tr>
1834 <td colspan='2'><textarea name='IDENT_HOSTS' cols='32' rows='6' wrap='off'>
1835 END
1836 ;
1837 if (!$proxysettings{'IDENT_HOSTS'}) {
1838 if (&Header::green_used()) {
1839 print "$green_cidr\n";
1840 }
1841
1842 if (&Header::blue_used()) {
1843 print "$blue_cidr\n";
1844 }
1845 } else {
1846 print $proxysettings{'IDENT_HOSTS'};
1847 }
1848
1849 print <<END
1850 </textarea></td>
1851 <td colspan='2'><textarea name='DST_NOAUTH' cols='32' rows='6' wrap='off'>
1852 END
1853 ;
1854
1855 print $proxysettings{'DST_NOAUTH'};
1856
1857 print <<END
1858 </textarea></td>
1859 </tr>
1860 </table>
1861 <hr size ='1'>
1862 <table width='100%'>
1863 <tr>
1864 <td colspan='4'><b>$Lang::tr{'advproxy IDENT user based access restrictions'}</b></td>
1865 </tr>
1866 <tr>
1867 <td width='25%' class='base'>$Lang::tr{'advproxy enabled'}:</td>
1868 <td width='20%'><input type='checkbox' name='IDENT_ENABLE_ACL' $checked{'IDENT_ENABLE_ACL'}{'on'} /></td>
1869 <td width='25%'>&nbsp;</td>
1870 <td width='30%'>&nbsp;</td>
1871 </tr>
1872 <tr>
1873 <td colspan='2'><input type='radio' name='IDENT_USER_ACL' value='positive' $checked{'IDENT_USER_ACL'}{'positive'} />
1874 $Lang::tr{'advproxy IDENT use positive access list'}:</td>
1875 <td colspan='2'><input type='radio' name='IDENT_USER_ACL' value='negative' $checked{'IDENT_USER_ACL'}{'negative'} />
1876 $Lang::tr{'advproxy IDENT use negative access list'}:</td>
1877 </tr>
1878 <tr>
1879 <td colspan='2'>$Lang::tr{'advproxy IDENT authorized users'}</td>
1880 <td colspan='2'>$Lang::tr{'advproxy IDENT unauthorized users'}</td>
1881 </tr>
1882 <tr>
1883 <td colspan='2'><textarea name='IDENT_ALLOW_USERS' cols='32' rows='6' wrap='off'>
1884 END
1885 ; }
1886
1887 if ($proxysettings{'AUTH_METHOD'} eq 'ident') { print $proxysettings{'IDENT_ALLOW_USERS'}; }
1888
1889 if ($proxysettings{'AUTH_METHOD'} eq 'ident') { print <<END
1890 </textarea></td>
1891 <td colspan='2'><textarea name='IDENT_DENY_USERS' cols='32' rows='6' wrap='off'>
1892 END
1893 ; }
1894
1895 if ($proxysettings{'AUTH_METHOD'} eq 'ident') { print $proxysettings{'IDENT_DENY_USERS'}; }
1896
1897 if ($proxysettings{'AUTH_METHOD'} eq 'ident') { print <<END
1898 </textarea></td>
1899 </tr>
1900 </table>
1901 END
1902 ; }
1903
1904 # ===================================================================
1905 # NTLM-AUTH settings
1906 # ===================================================================
1907
1908 if ($proxysettings{'AUTH_METHOD'} eq 'ntlm-auth') {
1909 print <<END;
1910 <hr size ='1'>
1911 <table width='100%'>
1912 <td width='20%' class='base'>$Lang::tr{'advproxy basic authentication'}:</td>
1913 <td width='40%'><input type='checkbox' name='NTLM_AUTH_BASIC' $checked{'NTLM_AUTH_BASIC'}{'on'} /></td>
1914 <td colspan='2'>&nbsp;</td>
1915 </table>
1916
1917 <hr size='1' />
1918
1919 <table width='100%'>
1920 <tr>
1921 <td colspan='4'><b>$Lang::tr{'advproxy group access control'}</b></td>
1922 </tr>
1923 <tr>
1924 <td width='20%' class='base'>$Lang::tr{'advproxy group required'}:</td>
1925 <td width='40%'><input type='text' name='NTLM_AUTH_GROUP' value='$proxysettings{'NTLM_AUTH_GROUP'}' size='37' /></td>
1926 <td>&nbsp;</td>
1927 <td>&nbsp;</td>
1928 </tr>
1929 </table>
1930 END
1931 }
1932
1933 # ===================================================================
1934 # LDAP auth settings
1935 # ===================================================================
1936
1937 if ($proxysettings{'AUTH_METHOD'} eq 'ldap') {
1938 print <<END
1939 <hr size='1'>
1940 <table width='100%'>
1941 <tr>
1942 <td colspan='4'><b>$Lang::tr{'advproxy LDAP common settings'}</b></td>
1943 </tr>
1944 <tr>
1945 <td class='base'>$Lang::tr{'advproxy LDAP basedn'}:</td>
1946 <td><input type='text' name='LDAP_BASEDN' value='$proxysettings{'LDAP_BASEDN'}' size='37' /></td>
1947 <td class='base'>$Lang::tr{'advproxy LDAP type'}:</td>
1948 <td class='base'><select name='LDAP_TYPE'>
1949 <option value='ADS' $selected{'LDAP_TYPE'}{'ADS'}>$Lang::tr{'advproxy LDAP ADS'}</option>
1950 <option value='NDS' $selected{'LDAP_TYPE'}{'NDS'}>$Lang::tr{'advproxy LDAP NDS'}</option>
1951 <option value='V2' $selected{'LDAP_TYPE'}{'V2'}>$Lang::tr{'advproxy LDAP V2'}</option>
1952 <option value='V3' $selected{'LDAP_TYPE'}{'V3'}>$Lang::tr{'advproxy LDAP V3'}</option>
1953 </select></td>
1954 </tr>
1955 <tr>
1956 <td width='20%' class='base'>$Lang::tr{'advproxy LDAP server'}:</td>
1957 <td width='40%'><input type='text' name='LDAP_SERVER' value='$proxysettings{'LDAP_SERVER'}' size='14' /></td>
1958 <td width='20%' class='base'>$Lang::tr{'advproxy LDAP port'}:</td>
1959 <td><input type='text' name='LDAP_PORT' value='$proxysettings{'LDAP_PORT'}' size='3' /></td>
1960 </tr>
1961 </table>
1962 <hr size ='1'>
1963 <table width='100%'>
1964 <tr>
1965 <td colspan='4'><b>$Lang::tr{'advproxy LDAP binddn settings'}</b></td>
1966 </tr>
1967 <tr>
1968 <td width='20%' class='base'>$Lang::tr{'advproxy LDAP binddn username'}:</td>
1969 <td width='40%'><input type='text' name='LDAP_BINDDN_USER' value='$proxysettings{'LDAP_BINDDN_USER'}' size='37' /></td>
1970 <td width='20%' class='base'>$Lang::tr{'advproxy LDAP binddn password'}:</td>
1971 <td><input type='password' name='LDAP_BINDDN_PASS' value='$proxysettings{'LDAP_BINDDN_PASS'}' size='14' /></td>
1972 </tr>
1973 </table>
1974 <hr size ='1'>
1975 <table width='100%'>
1976 <tr>
1977 <td colspan='4'><b>$Lang::tr{'advproxy LDAP group access control'}</b></td>
1978 </tr>
1979 <tr>
1980 <td width='20%' class='base'>$Lang::tr{'advproxy LDAP group required'}:</td>
1981 <td width='40%'><input type='text' name='LDAP_GROUP' value='$proxysettings{'LDAP_GROUP'}' size='37' /></td>
1982 <td>&nbsp;</td>
1983 <td>&nbsp;</td>
1984 </tr>
1985 </table>
1986 END
1987 ; }
1988
1989 # ===================================================================
1990 # RADIUS auth settings
1991 # ===================================================================
1992
1993 if ($proxysettings{'AUTH_METHOD'} eq 'radius') {
1994 print <<END
1995 <hr size='1'>
1996 <table width='100%'>
1997 <tr>
1998 <td colspan='4'><b>$Lang::tr{'advproxy RADIUS radius settings'}</b></td>
1999 </tr>
2000 <tr>
2001 <td width='25%' class='base'>$Lang::tr{'advproxy RADIUS server'}:</td>
2002 <td width='20%'><input type='text' name='RADIUS_SERVER' value='$proxysettings{'RADIUS_SERVER'}' size='14' /></td>
2003 <td width='25%' class='base'>$Lang::tr{'advproxy RADIUS port'}:</td>
2004 <td width='30%'><input type='text' name='RADIUS_PORT' value='$proxysettings{'RADIUS_PORT'}' size='3' /></td>
2005 </tr>
2006 <tr>
2007 <td class='base'>$Lang::tr{'advproxy RADIUS identifier'}:</td>
2008 <td><input type='text' name='RADIUS_IDENTIFIER' value='$proxysettings{'RADIUS_IDENTIFIER'}' size='14' /></td>
2009 <td class='base'>$Lang::tr{'advproxy RADIUS secret'}:</td>
2010 <td><input type='password' name='RADIUS_SECRET' value='$proxysettings{'RADIUS_SECRET'}' size='14' /></td>
2011 </tr>
2012 </table>
2013 <hr size ='1'>
2014 <table width='100%'>
2015 <tr>
2016 <td colspan='4'><b>$Lang::tr{'advproxy RADIUS user based access restrictions'}</b></td>
2017 </tr>
2018 <tr>
2019 <td width='25%' class='base'>$Lang::tr{'advproxy enabled'}:</td>
2020 <td width='20%'><input type='checkbox' name='RADIUS_ENABLE_ACL' $checked{'RADIUS_ENABLE_ACL'}{'on'} /></td>
2021 <td width='25%'>&nbsp;</td>
2022 <td width='30%'>&nbsp;</td>
2023 </tr>
2024 <tr>
2025 <td colspan='2'><input type='radio' name='RADIUS_USER_ACL' value='positive' $checked{'RADIUS_USER_ACL'}{'positive'} />
2026 $Lang::tr{'advproxy RADIUS use positive access list'}:</td>
2027 <td colspan='2'><input type='radio' name='RADIUS_USER_ACL' value='negative' $checked{'RADIUS_USER_ACL'}{'negative'} />
2028 $Lang::tr{'advproxy RADIUS use negative access list'}:</td>
2029 </tr>
2030 <tr>
2031 <td colspan='2'>$Lang::tr{'advproxy RADIUS authorized users'}</td>
2032 <td colspan='2'>$Lang::tr{'advproxy RADIUS unauthorized users'}</td>
2033 </tr>
2034 <tr>
2035 <td colspan='2'><textarea name='RADIUS_ALLOW_USERS' cols='32' rows='6' wrap='off'>
2036 END
2037 ; }
2038
2039 if ($proxysettings{'AUTH_METHOD'} eq 'radius') { print $proxysettings{'RADIUS_ALLOW_USERS'}; }
2040
2041 if ($proxysettings{'AUTH_METHOD'} eq 'radius') { print <<END
2042 </textarea></td>
2043 <td colspan='2'><textarea name='RADIUS_DENY_USERS' cols='32' rows='6' wrap='off'>
2044 END
2045 ; }
2046
2047 if ($proxysettings{'AUTH_METHOD'} eq 'radius') { print $proxysettings{'RADIUS_DENY_USERS'}; }
2048
2049 if ($proxysettings{'AUTH_METHOD'} eq 'radius') { print <<END
2050 </textarea></td>
2051 </tr>
2052 </table>
2053 END
2054 ; }
2055
2056 # ===================================================================
2057
2058 }
2059
2060 print "<table>\n";
2061
2062 if ($proxysettings{'AUTH_METHOD'} eq 'none') {
2063 print <<END
2064 <td><input type='hidden' name='AUTH_CHILDREN' value='$proxysettings{'AUTH_CHILDREN'}'></td>
2065 <td><input type='hidden' name='AUTH_CACHE_TTL' value='$proxysettings{'AUTH_CACHE_TTL'}' size='5' /></td>
2066 <td><input type='hidden' name='AUTH_MAX_USERIP' value='$proxysettings{'AUTH_MAX_USERIP'}' size='5' /></td>
2067 <td><input type='hidden' name='AUTH_IPCACHE_TTL' value='$proxysettings{'AUTH_IPCACHE_TTL'}' size='5' /></td>
2068 <td><input type='hidden' name='AUTH_ALWAYS_REQUIRED' value='$proxysettings{'AUTH_ALWAYS_REQUIRED'}'></td>
2069 <td><input type='hidden' name='AUTH_REALM' value='$proxysettings{'AUTH_REALM'}'></td>
2070 <td><input type='hidden' name='DST_NOAUTH' value='$proxysettings{'DST_NOAUTH'}'></td>
2071 END
2072 ; }
2073
2074 if ($proxysettings{'AUTH_METHOD'} eq 'ident') {
2075 print <<END
2076 <td><input type='hidden' name='AUTH_CHILDREN' value='$proxysettings{'AUTH_CHILDREN'}'></td>
2077 <td><input type='hidden' name='AUTH_CACHE_TTL' value='$proxysettings{'AUTH_CACHE_TTL'}' size='5' /></td>
2078 <td><input type='hidden' name='AUTH_MAX_USERIP' value='$proxysettings{'AUTH_MAX_USERIP'}' size='5' /></td>
2079 <td><input type='hidden' name='AUTH_IPCACHE_TTL' value='$proxysettings{'AUTH_IPCACHE_TTL'}' size='5' /></td>
2080 <td><input type='hidden' name='AUTH_REALM' value='$proxysettings{'AUTH_REALM'}'></td>
2081 END
2082 ; }
2083
2084 if (!($proxysettings{'AUTH_METHOD'} eq 'ncsa')) {
2085 print <<END
2086 <td><input type='hidden' name='NCSA_MIN_PASS_LEN' value='$proxysettings{'NCSA_MIN_PASS_LEN'}'></td>
2087 <td><input type='hidden' name='NCSA_BYPASS_REDIR' value='$proxysettings{'NCSA_BYPASS_REDIR'}'></td>
2088 END
2089 ; }
2090
2091 if (!($proxysettings{'AUTH_METHOD'} eq 'ident')) {
2092 print <<END
2093 <td><input type='hidden' name='IDENT_REQUIRED' value='$proxysettings{'IDENT_REQUIRED'}'></td>
2094 <td><input type='hidden' name='IDENT_TIMEOUT' value='$proxysettings{'IDENT_TIMEOUT'}'></td>
2095 <td><input type='hidden' name='IDENT_HOSTS' value='$proxysettings{'IDENT_HOSTS'}'></td>
2096 <td><input type='hidden' name='IDENT_ENABLE_ACL' value='$proxysettings{'IDENT_ENABLE_ACL'}'></td>
2097 <td><input type='hidden' name='IDENT_USER_ACL' value='$proxysettings{'IDENT_USER_ACL'}'></td>
2098 <td><input type='hidden' name='IDENT_ALLOW_USERS' value='$proxysettings{'IDENT_ALLOW_USERS'}'></td>
2099 <td><input type='hidden' name='IDENT_DENY_USERS' value='$proxysettings{'IDENT_DENY_USERS'}'></td>
2100 END
2101 ; }
2102
2103 if (!($proxysettings{'AUTH_METHOD'} eq 'ldap')) {
2104 print <<END
2105 <td><input type='hidden' name='LDAP_BASEDN' value='$proxysettings{'LDAP_BASEDN'}'></td>
2106 <td><input type='hidden' name='LDAP_TYPE' value='$proxysettings{'LDAP_TYPE'}'></td>
2107 <td><input type='hidden' name='LDAP_SERVER' value='$proxysettings{'LDAP_SERVER'}'></td>
2108 <td><input type='hidden' name='LDAP_PORT' value='$proxysettings{'LDAP_PORT'}'></td>
2109 <td><input type='hidden' name='LDAP_BINDDN_USER' value='$proxysettings{'LDAP_BINDDN_USER'}'></td>
2110 <td><input type='hidden' name='LDAP_BINDDN_PASS' value='$proxysettings{'LDAP_BINDDN_PASS'}'></td>
2111 <td><input type='hidden' name='LDAP_GROUP' value='$proxysettings{'LDAP_GROUP'}'></td>
2112 END
2113 ; }
2114
2115 if (!($proxysettings{'AUTH_METHOD'} eq 'radius')) {
2116 print <<END
2117 <td><input type='hidden' name='RADIUS_SERVER' value='$proxysettings{'RADIUS_SERVER'}'></td>
2118 <td><input type='hidden' name='RADIUS_PORT' value='$proxysettings{'RADIUS_PORT'}'></td>
2119 <td><input type='hidden' name='RADIUS_IDENTIFIER' value='$proxysettings{'RADIUS_IDENTIFIER'}'></td>
2120 <td><input type='hidden' name='RADIUS_SECRET' value='$proxysettings{'RADIUS_SECRET'}'></td>
2121 <td><input type='hidden' name='RADIUS_ENABLE_ACL' value='$proxysettings{'RADIUS_ENABLE_ACL'}'></td>
2122 <td><input type='hidden' name='RADIUS_USER_ACL' value='$proxysettings{'RADIUS_USER_ACL'}'></td>
2123 <td><input type='hidden' name='RADIUS_ALLOW_USERS' value='$proxysettings{'RADIUS_ALLOW_USERS'}'></td>
2124 <td><input type='hidden' name='RADIUS_DENY_USERS' value='$proxysettings{'RADIUS_DENY_USERS'}'></td>
2125 END
2126 ; }
2127
2128 print "</table>\n";
2129
2130 print <<END
2131 <hr size='1'>
2132 END
2133 ;
2134
2135 print <<END
2136 <table width='100%'>
2137 <tr>
2138 <td>&nbsp;</td>
2139 <td align='center'><input type='submit' name='ACTION' value='$Lang::tr{'save'}' /></td>
2140 <td align='center'><input type='submit' name='ACTION' value='$Lang::tr{'proxy reconfigure'}' /></td>
2141 <td align='center'><input type='submit' name='ACTION' value='$Lang::tr{'advproxy save and restart'}' /></td>
2142 <td align='center'><input type='submit' name='ACTION' value='$Lang::tr{'advproxy clear cache'}' /></td>
2143 <td>&nbsp;</td>
2144 </tr>
2145
2146 </table>
2147 <br />
2148 <table width='100%'>
2149 <tr>
2150 <td><img src='/blob.gif' align='top' alt='*' />&nbsp;<font class='base'>$Lang::tr{'required field'}</font></td>
2151 <td align='right'>&nbsp;</td>
2152 </tr>
2153 </table>
2154 </form>
2155 END
2156 ;
2157
2158 &Header::closebox();
2159
2160 } else {
2161
2162 # ===================================================================
2163 # NCSA user management
2164 # ===================================================================
2165
2166 &Header::openbox('100%', 'left', "$Lang::tr{'advproxy NCSA auth'}");
2167 print <<END
2168 <form method='post' action='$ENV{'SCRIPT_NAME'}'>
2169 <table width='100%'>
2170 <tr>
2171 <td colspan='4'><b>$Lang::tr{'advproxy NCSA user management'}</b></td>
2172 </tr>
2173 <tr>
2174 <td width='25%' class='base'>$Lang::tr{'advproxy NCSA username'}:</td>
2175 <td width='25%'><input type='text' name='NCSA_USERNAME' value='$proxysettings{'NCSA_USERNAME'}' size='12'
2176 END
2177 ;
2178 if ($proxysettings{'ACTION'} eq $Lang::tr{'edit'}) { print " readonly='readonly' "; }
2179 print <<END
2180 /></td>
2181 <td width='25%' class='base'>$Lang::tr{'advproxy NCSA group'}:</td>
2182 <td class='base'>
2183 <select name='NCSA_GROUP'>
2184 <option value='standard' $selected{'NCSA_GROUP'}{'standard'}>$Lang::tr{'advproxy NCSA grp standard'}</option>
2185 <option value='extended' $selected{'NCSA_GROUP'}{'extended'}>$Lang::tr{'advproxy NCSA grp extended'}</option>
2186 <option value='disabled' $selected{'NCSA_GROUP'}{'disabled'}>$Lang::tr{'advproxy NCSA grp disabled'}</option>
2187 </select>
2188 </td>
2189
2190 </tr>
2191 <tr>
2192 <td class='base'>$Lang::tr{'advproxy NCSA password'}:</td>
2193 <td><input type='password' name='NCSA_PASS' value='$proxysettings{'NCSA_PASS'}' size='14' /></td>
2194 <td class='base'>$Lang::tr{'advproxy NCSA password confirm'}:</td>
2195 <td><input type='password' name='NCSA_PASS_CONFIRM' value='$proxysettings{'NCSA_PASS_CONFIRM'}' size='14' /></td>
2196 </tr>
2197 </table>
2198 <br>
2199 <table>
2200 <tr>
2201 <td>&nbsp;</td>
2202 <td><input type='submit' name='SUBMIT' value='$ncsa_buttontext' /></td>
2203 <td><input type='hidden' name='ACTION' value='$Lang::tr{'add'}' /></td>
2204 <td><input type='hidden' name='NCSA_MIN_PASS_LEN' value='$proxysettings{'NCSA_MIN_PASS_LEN'}'></td>
2205 END
2206 ;
2207 if ($proxysettings{'ACTION'} eq $Lang::tr{'edit'}) {
2208 print "<td><input type='reset' name='ACTION' value='$Lang::tr{'advproxy reset'}' /></td>\n";
2209 }
2210
2211 print <<END
2212 <td>&nbsp;</td>
2213 <td>&nbsp;</td>
2214 <td><input type='button' name='return2main' value='$Lang::tr{'advproxy back to main page'}' onClick='self.location.href="$ENV{'SCRIPT_NAME'}"'></td>
2215 </tr>
2216 </table>
2217 </form>
2218 <hr size='1'>
2219 <table width='100%'>
2220 <tr>
2221 <td><b>$Lang::tr{'advproxy NCSA user accounts'}:</b></td>
2222 </tr>
2223 </table>
2224 <table width='100%' align='center'>
2225 END
2226 ;
2227
2228 if (-e $extgrp)
2229 {
2230 open(FILE, $extgrp); @grouplist = <FILE>; close(FILE);
2231 foreach $user (@grouplist) { chomp($user); push(@userlist,$user.":extended"); }
2232 }
2233 if (-e $stdgrp)
2234 {
2235 open(FILE, $stdgrp); @grouplist = <FILE>; close(FILE);
2236 foreach $user (@grouplist) { chomp($user); push(@userlist,$user.":standard"); }
2237 }
2238 if (-e $disgrp)
2239 {
2240 open(FILE, $disgrp); @grouplist = <FILE>; close(FILE);
2241 foreach $user (@grouplist) { chomp($user); push(@userlist,$user.":disabled"); }
2242 }
2243
2244 @userlist = sort(@userlist);
2245
2246 # If the password file contains entries, print entries and action icons
2247
2248 if ( ! -z "$userdb" ) {
2249 print <<END
2250 <tr>
2251 <td width='30%' class='boldbase' align='center'><b><i>$Lang::tr{'advproxy NCSA username'}</i></b></td>
2252 <td width='30%' class='boldbase' align='center'><b><i>$Lang::tr{'advproxy NCSA group membership'}</i></b></td>
2253 <td class='boldbase' colspan='2' align='center'>&nbsp;</td>
2254 </tr>
2255 END
2256 ;
2257 $id = 0;
2258 foreach $line (@userlist)
2259 {
2260 $id++;
2261 chomp($line);
2262 @temp = split(/:/,$line);
2263 if($proxysettings{'ACTION'} eq $Lang::tr{'edit'} && $proxysettings{'ID'} eq $line) {
2264 print "<tr bgcolor='$Header::colouryellow'>\n"; }
2265 elsif ($id % 2) {
2266 print "<tr bgcolor='$color{'color20'}'>\n"; }
2267 else {
2268 print "<tr bgcolor='$color{'color22'}'>\n"; }
2269
2270 print <<END
2271 <td align='center'>$temp[0]</td>
2272 <td align='center'>
2273 END
2274 ;
2275 if ($temp[1] eq 'standard') {
2276 print $Lang::tr{'advproxy NCSA grp standard'};
2277 } elsif ($temp[1] eq 'extended') {
2278 print $Lang::tr{'advproxy NCSA grp extended'};
2279 } elsif ($temp[1] eq 'disabled') {
2280 print $Lang::tr{'advproxy NCSA grp disabled'}; }
2281 print <<END
2282 </td>
2283 <td width='8%' align='center'>
2284 <form method='post' name='frma$id' action='$ENV{'SCRIPT_NAME'}'>
2285 <input type='image' name='$Lang::tr{'edit'}' src='/images/edit.gif' title='$Lang::tr{'edit'}' alt='$Lang::tr{'edit'}' />
2286 <input type='hidden' name='ID' value='$line' />
2287 <input type='hidden' name='ACTION' value='$Lang::tr{'edit'}' />
2288 </form>
2289 </td>
2290
2291 <td width='8%' align='center'>
2292 <form method='post' name='frmb$id' action='$ENV{'SCRIPT_NAME'}'>
2293 <input type='image' name='$Lang::tr{'remove'}' src='/images/delete.gif' title='$Lang::tr{'remove'}' alt='$Lang::tr{'remove'}' />
2294 <input type='hidden' name='ID' value='$temp[0]' />
2295 <input type='hidden' name='ACTION' value='$Lang::tr{'remove'}' />
2296 </form>
2297 </td>
2298 </tr>
2299 END
2300 ;
2301 }
2302
2303 print <<END
2304 </table>
2305 <br>
2306 <table>
2307 <tr>
2308 <td class='boldbase'>&nbsp; <b>$Lang::tr{'legend'}:</b></td>
2309 <td>&nbsp; &nbsp; <img src='/images/edit.gif' alt='$Lang::tr{'edit'}' /></td>
2310 <td class='base'>$Lang::tr{'edit'}</td>
2311 <td>&nbsp; &nbsp; <img src='/images/delete.gif' alt='$Lang::tr{'remove'}' /></td>
2312 <td class='base'>$Lang::tr{'remove'}</td>
2313 </tr>
2314 END
2315 ;
2316 } else {
2317 print <<END
2318 <tr>
2319 <td><i>$Lang::tr{'advproxy NCSA no accounts'}</i></td>
2320 </tr>
2321 END
2322 ;
2323 }
2324
2325 print <<END
2326 </table>
2327 END
2328 ;
2329
2330 &Header::closebox();
2331
2332 }
2333
2334 # ===================================================================
2335
2336 &Header::closebigbox();
2337
2338 &Header::closepage();
2339
2340 # -------------------------------------------------------------------
2341
2342 sub read_acls
2343 {
2344 if (-e "$acl_src_subnets") {
2345 open(FILE,"$acl_src_subnets");
2346 delete $proxysettings{'SRC_SUBNETS'};
2347 while (<FILE>) { $proxysettings{'SRC_SUBNETS'} .= $_ };
2348 close(FILE);
2349 }
2350 if (-e "$acl_src_banned_ip") {
2351 open(FILE,"$acl_src_banned_ip");
2352 delete $proxysettings{'SRC_BANNED_IP'};
2353 while (<FILE>) { $proxysettings{'SRC_BANNED_IP'} .= $_ };
2354 close(FILE);
2355 }
2356 if (-e "$acl_src_banned_mac") {
2357 open(FILE,"$acl_src_banned_mac");
2358 delete $proxysettings{'SRC_BANNED_MAC'};
2359 while (<FILE>) { $proxysettings{'SRC_BANNED_MAC'} .= $_ };
2360 close(FILE);
2361 }
2362 if (-e "$acl_src_unrestricted_ip") {
2363 open(FILE,"$acl_src_unrestricted_ip");
2364 delete $proxysettings{'SRC_UNRESTRICTED_IP'};
2365 while (<FILE>) { $proxysettings{'SRC_UNRESTRICTED_IP'} .= $_ };
2366 close(FILE);
2367 }
2368 if (-e "$acl_src_unrestricted_mac") {
2369 open(FILE,"$acl_src_unrestricted_mac");
2370 delete $proxysettings{'SRC_UNRESTRICTED_MAC'};
2371 while (<FILE>) { $proxysettings{'SRC_UNRESTRICTED_MAC'} .= $_ };
2372 close(FILE);
2373 }
2374 if (-e "$acl_dst_nocache") {
2375 open(FILE,"$acl_dst_nocache");
2376 delete $proxysettings{'DST_NOCACHE'};
2377 while (<FILE>) { $proxysettings{'DST_NOCACHE'} .= $_ };
2378 close(FILE);
2379 }
2380 if (-e "$acl_dst_noauth") {
2381 open(FILE,"$acl_dst_noauth");
2382 delete $proxysettings{'DST_NOAUTH'};
2383 while (<FILE>) { $proxysettings{'DST_NOAUTH'} .= $_ };
2384 close(FILE);
2385 }
2386 if (-e "$acl_dst_noproxy_ip") {
2387 open(FILE,"$acl_dst_noproxy_ip");
2388 delete $proxysettings{'DST_NOPROXY_IP'};
2389 while (<FILE>) { $proxysettings{'DST_NOPROXY_IP'} .= $_ };
2390 close(FILE);
2391 }
2392 if (-e "$acl_dst_noproxy_url") {
2393 open(FILE,"$acl_dst_noproxy_url");
2394 delete $proxysettings{'DST_NOPROXY_URL'};
2395 while (<FILE>) { $proxysettings{'DST_NOPROXY_URL'} .= $_ };
2396 close(FILE);
2397 }
2398 if (-e "$acl_ports_safe") {
2399 open(FILE,"$acl_ports_safe");
2400 delete $proxysettings{'PORTS_SAFE'};
2401 while (<FILE>) { $proxysettings{'PORTS_SAFE'} .= $_ };
2402 close(FILE);
2403 }
2404 if (-e "$acl_ports_ssl") {
2405 open(FILE,"$acl_ports_ssl");
2406 delete $proxysettings{'PORTS_SSL'};
2407 while (<FILE>) { $proxysettings{'PORTS_SSL'} .= $_ };
2408 close(FILE);
2409 }
2410 if (-e "$mimetypes") {
2411 open(FILE,"$mimetypes");
2412 delete $proxysettings{'MIME_TYPES'};
2413 while (<FILE>) { $proxysettings{'MIME_TYPES'} .= $_ };
2414 close(FILE);
2415 }
2416 if (-e "$raddir/radauth.allowusers") {
2417 open(FILE,"$raddir/radauth.allowusers");
2418 delete $proxysettings{'RADIUS_ALLOW_USERS'};
2419 while (<FILE>) { $proxysettings{'RADIUS_ALLOW_USERS'} .= $_ };
2420 close(FILE);
2421 }
2422 if (-e "$raddir/radauth.denyusers") {
2423 open(FILE,"$raddir/radauth.denyusers");
2424 delete $proxysettings{'RADIUS_DENY_USERS'};
2425 while (<FILE>) { $proxysettings{'RADIUS_DENY_USERS'} .= $_ };
2426 close(FILE);
2427 }
2428 if (-e "$identdir/identauth.allowusers") {
2429 open(FILE,"$identdir/identauth.allowusers");
2430 delete $proxysettings{'IDENT_ALLOW_USERS'};
2431 while (<FILE>) { $proxysettings{'IDENT_ALLOW_USERS'} .= $_ };
2432 close(FILE);
2433 }
2434 if (-e "$identdir/identauth.denyusers") {
2435 open(FILE,"$identdir/identauth.denyusers");
2436 delete $proxysettings{'IDENT_DENY_USERS'};
2437 while (<FILE>) { $proxysettings{'IDENT_DENY_USERS'} .= $_ };
2438 close(FILE);
2439 }
2440 if (-e "$identhosts") {
2441 open(FILE,"$identhosts");
2442 delete $proxysettings{'IDENT_HOSTS'};
2443 while (<FILE>) { $proxysettings{'IDENT_HOSTS'} .= $_ };
2444 close(FILE);
2445 }
2446 if (-e "$cre_groups") {
2447 open(FILE,"$cre_groups");
2448 delete $proxysettings{'CRE_GROUPS'};
2449 while (<FILE>) { $proxysettings{'CRE_GROUPS'} .= $_ };
2450 close(FILE);
2451 }
2452 if (-e "$cre_svhosts") {
2453 open(FILE,"$cre_svhosts");
2454 delete $proxysettings{'CRE_SVHOSTS'};
2455 while (<FILE>) { $proxysettings{'CRE_SVHOSTS'} .= $_ };
2456 close(FILE);
2457 }
2458 }
2459
2460 # -------------------------------------------------------------------
2461
2462 sub check_acls
2463 {
2464 @temp = split(/\n/,$proxysettings{'PORTS_SAFE'});
2465 undef $proxysettings{'PORTS_SAFE'};
2466 foreach (@temp)
2467 {
2468 s/^\s+//g; s/\s+$//g;
2469 if ($_)
2470 {
2471 $line = $_;
2472 if (/^[^#]+\s+#\sSquids\sport/) { s/(^[^#]+)(\s+#\sSquids\sport)/$proxysettings{'PROXY_PORT'}\2/; $line=$_; }
2473 s/#.*//g; s/\s+//g;
2474 if (/.*-.*-.*/) { $errormessage = $Lang::tr{'advproxy errmsg invalid destination port'}; }
2475 @templist = split(/-/);
2476 foreach (@templist) { unless (&General::validport($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid destination port'}; } }
2477 $proxysettings{'PORTS_SAFE'} .= $line."\n";
2478 }
2479 }
2480
2481 @temp = split(/\n/,$proxysettings{'PORTS_SSL'});
2482 undef $proxysettings{'PORTS_SSL'};
2483 foreach (@temp)
2484 {
2485 s/^\s+//g; s/\s+$//g;
2486 if ($_)
2487 {
2488 $line = $_;
2489 s/#.*//g; s/\s+//g;
2490 if (/.*-.*-.*/) { $errormessage = $Lang::tr{'advproxy errmsg invalid destination port'}; }
2491 @templist = split(/-/);
2492 foreach (@templist) { unless (&General::validport($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid destination port'}; } }
2493 $proxysettings{'PORTS_SSL'} .= $line."\n";
2494 }
2495 }
2496
2497 @temp = split(/\n/,$proxysettings{'DST_NOCACHE'});
2498 undef $proxysettings{'DST_NOCACHE'};
2499 foreach (@temp)
2500 {
2501 s/^\s+//g;
2502 unless (/^#/) { s/\s+//g; }
2503 if ($_)
2504 {
2505 if (/^\./) { $_ = '*'.$_; }
2506 unless (&General::validwildcarddomainname($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid url'} . ": " . &Header::escape($_); }
2507 $proxysettings{'DST_NOCACHE'} .= $_."\n";
2508 }
2509 }
2510
2511 @temp = split(/\n/,$proxysettings{'SRC_SUBNETS'});
2512 undef $proxysettings{'SRC_SUBNETS'};
2513 foreach (@temp)
2514 {
2515 s/^\s+//g; s/\s+$//g;
2516 if ($_)
2517 {
2518 unless (&Network::check_subnet($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid ip or mask'} . ": $_"; }
2519 $proxysettings{'SRC_SUBNETS'} .= $_."\n";
2520 }
2521 }
2522
2523 @temp = split(/\n/,$proxysettings{'SRC_BANNED_IP'});
2524 undef $proxysettings{'SRC_BANNED_IP'};
2525 foreach (@temp)
2526 {
2527 s/^\s+//g; s/\s+$//g;
2528 if ($_)
2529 {
2530 unless (&General::validipormask($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid ip or mask'}; }
2531 $proxysettings{'SRC_BANNED_IP'} .= $_."\n";
2532 }
2533 }
2534
2535 @temp = split(/\n/,$proxysettings{'SRC_BANNED_MAC'});
2536 undef $proxysettings{'SRC_BANNED_MAC'};
2537 foreach (@temp)
2538 {
2539 s/^\s+//g; s/\s+$//g; s/-/:/g;
2540 if ($_)
2541 {
2542 unless (&General::validmac($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid mac'}; }
2543 $proxysettings{'SRC_BANNED_MAC'} .= $_."\n";
2544 }
2545 }
2546
2547 @temp = split(/\n/,$proxysettings{'SRC_UNRESTRICTED_IP'});
2548 undef $proxysettings{'SRC_UNRESTRICTED_IP'};
2549 foreach (@temp)
2550 {
2551 s/^\s+//g; s/\s+$//g;
2552 if ($_)
2553 {
2554 unless (&General::validipormask($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid ip or mask'}; }
2555 $proxysettings{'SRC_UNRESTRICTED_IP'} .= $_."\n";
2556 }
2557 }
2558
2559 @temp = split(/\n/,$proxysettings{'SRC_UNRESTRICTED_MAC'});
2560 undef $proxysettings{'SRC_UNRESTRICTED_MAC'};
2561 foreach (@temp)
2562 {
2563 s/^\s+//g; s/\s+$//g; s/-/:/g;
2564 if ($_)
2565 {
2566 unless (&General::validmac($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid mac'}; }
2567 $proxysettings{'SRC_UNRESTRICTED_MAC'} .= $_."\n";
2568 }
2569 }
2570
2571 @temp = split(/\n/,$proxysettings{'DST_NOAUTH'});
2572 undef $proxysettings{'DST_NOAUTH'};
2573 foreach (@temp)
2574 {
2575 s/^\s+//g;
2576 unless (/^#/) { s/\s+//g; }
2577 if ($_)
2578 {
2579 if (/^\./) { $_ = '*'.$_; }
2580 $proxysettings{'DST_NOAUTH'} .= $_."\n";
2581 }
2582 }
2583
2584 @temp = split(/\n/,$proxysettings{'DST_NOPROXY_IP'});
2585 undef $proxysettings{'DST_NOPROXY_IP'};
2586 foreach (@temp)
2587 {
2588 s/^\s+//g; s/\s+$//g;
2589 if ($_)
2590 {
2591 unless (&General::validipormask($_)) { $errormessage = $Lang::tr{'advproxy errmsg wpad invalid ip or mask'}; }
2592 $proxysettings{'DST_NOPROXY_IP'} .= $_."\n";
2593 }
2594 }
2595
2596 @temp = split(/\n/,$proxysettings{'DST_NOPROXY_URL'});
2597 undef $proxysettings{'DST_NOPROXY_URL'};
2598 foreach (@temp)
2599 {
2600 s/^\s+//g;
2601 unless (/^#/) { s/\s+//g; }
2602 if ($_)
2603 {
2604 if (/^\./) { $_ = '*'.$_; }
2605 unless (&General::validwildcarddomainname($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid url'} . ": " . &Header::escape($_); }
2606 $proxysettings{'DST_NOPROXY_URL'} .= $_."\n";
2607 }
2608 }
2609
2610 if (($proxysettings{'NTLM_ENABLE_ACL'} eq 'on') && ($proxysettings{'NTLM_USER_ACL'} eq 'positive'))
2611 {
2612 @temp = split(/\n/,$proxysettings{'NTLM_ALLOW_USERS'});
2613 undef $proxysettings{'NTLM_ALLOW_USERS'};
2614 foreach (@temp)
2615 {
2616 s/^\s+//g; s/\s+$//g;
2617 if ($_) { $proxysettings{'NTLM_ALLOW_USERS'} .= $_."\n"; }
2618 }
2619 if ($proxysettings{'NTLM_ALLOW_USERS'} eq '') { $errormessage = $Lang::tr{'advproxy errmsg acl cannot be empty'}; }
2620 }
2621
2622 if (($proxysettings{'NTLM_ENABLE_ACL'} eq 'on') && ($proxysettings{'NTLM_USER_ACL'} eq 'negative'))
2623 {
2624 @temp = split(/\n/,$proxysettings{'NTLM_DENY_USERS'});
2625 undef $proxysettings{'NTLM_DENY_USERS'};
2626 foreach (@temp)
2627 {
2628 s/^\s+//g; s/\s+$//g;
2629 if ($_) { $proxysettings{'NTLM_DENY_USERS'} .= $_."\n"; }
2630 }
2631 if ($proxysettings{'NTLM_DENY_USERS'} eq '') { $errormessage = $Lang::tr{'advproxy errmsg acl cannot be empty'}; }
2632 }
2633
2634 if (($proxysettings{'IDENT_ENABLE_ACL'} eq 'on') && ($proxysettings{'IDENT_USER_ACL'} eq 'positive'))
2635 {
2636 @temp = split(/\n/,$proxysettings{'IDENT_ALLOW_USERS'});
2637 undef $proxysettings{'IDENT_ALLOW_USERS'};
2638 foreach (@temp)
2639 {
2640 s/^\s+//g; s/\s+$//g;
2641 if ($_) { $proxysettings{'IDENT_ALLOW_USERS'} .= $_."\n"; }
2642 }
2643 if ($proxysettings{'IDENT_ALLOW_USERS'} eq '') { $errormessage = $Lang::tr{'advproxy errmsg acl cannot be empty'}; }
2644 }
2645
2646 if (($proxysettings{'IDENT_ENABLE_ACL'} eq 'on') && ($proxysettings{'IDENT_USER_ACL'} eq 'negative'))
2647 {
2648 @temp = split(/\n/,$proxysettings{'IDENT_DENY_USERS'});
2649 undef $proxysettings{'IDENT_DENY_USERS'};
2650 foreach (@temp)
2651 {
2652 s/^\s+//g; s/\s+$//g;
2653 if ($_) { $proxysettings{'IDENT_DENY_USERS'} .= $_."\n"; }
2654 }
2655 if ($proxysettings{'IDENT_DENY_USERS'} eq '') { $errormessage = $Lang::tr{'advproxy errmsg acl cannot be empty'}; }
2656 }
2657
2658 if (($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on') && ($proxysettings{'RADIUS_USER_ACL'} eq 'positive'))
2659 {
2660 @temp = split(/\n/,$proxysettings{'RADIUS_ALLOW_USERS'});
2661 undef $proxysettings{'RADIUS_ALLOW_USERS'};
2662 foreach (@temp)
2663 {
2664 s/^\s+//g; s/\s+$//g;
2665 if ($_) { $proxysettings{'RADIUS_ALLOW_USERS'} .= $_."\n"; }
2666 }
2667 if ($proxysettings{'RADIUS_ALLOW_USERS'} eq '') { $errormessage = $Lang::tr{'advproxy errmsg acl cannot be empty'}; }
2668 }
2669
2670 if (($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on') && ($proxysettings{'RADIUS_USER_ACL'} eq 'negative'))
2671 {
2672 @temp = split(/\n/,$proxysettings{'RADIUS_DENY_USERS'});
2673 undef $proxysettings{'RADIUS_DENY_USERS'};
2674 foreach (@temp)
2675 {
2676 s/^\s+//g; s/\s+$//g;
2677 if ($_) { $proxysettings{'RADIUS_DENY_USERS'} .= $_."\n"; }
2678 }
2679 if ($proxysettings{'RADIUS_DENY_USERS'} eq '') { $errormessage = $Lang::tr{'advproxy errmsg acl cannot be empty'}; }
2680 }
2681
2682 @temp = split(/\n/,$proxysettings{'IDENT_HOSTS'});
2683 undef $proxysettings{'IDENT_HOSTS'};
2684 foreach (@temp)
2685 {
2686 s/^\s+//g; s/\s+$//g;
2687 if ($_)
2688 {
2689 unless (&General::validipormask($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid ip or mask'}; }
2690 $proxysettings{'IDENT_HOSTS'} .= $_."\n";
2691 }
2692 }
2693
2694 @temp = split(/\n/,$proxysettings{'CRE_SVHOSTS'});
2695 undef $proxysettings{'CRE_SVHOSTS'};
2696 foreach (@temp)
2697 {
2698 s/^\s+//g; s/\s+$//g;
2699 if ($_)
2700 {
2701 unless (&General::validipormask($_)) { $errormessage = $Lang::tr{'advproxy errmsg invalid ip or mask'}; }
2702 $proxysettings{'CRE_SVHOSTS'} .= $_."\n";
2703 }
2704 }
2705 }
2706
2707 # -------------------------------------------------------------------
2708
2709 sub write_acls
2710 {
2711 open(FILE, ">$acl_src_subnets");
2712 flock(FILE, 2);
2713 if (!$proxysettings{'SRC_SUBNETS'})
2714 {
2715 if (&Header::green_used()) {
2716 print FILE "$green_cidr\n";
2717 }
2718
2719 if (&Header::blue_used()) {
2720 print FILE "$blue_cidr\n";
2721 }
2722 } else { print FILE $proxysettings{'SRC_SUBNETS'}; }
2723 close(FILE);
2724
2725 open(FILE, ">$acl_src_banned_ip");
2726 flock(FILE, 2);
2727 print FILE $proxysettings{'SRC_BANNED_IP'};
2728 close(FILE);
2729
2730 open(FILE, ">$acl_src_banned_mac");
2731 flock(FILE, 2);
2732 print FILE $proxysettings{'SRC_BANNED_MAC'};
2733 close(FILE);
2734
2735 open(FILE, ">$acl_src_unrestricted_ip");
2736 flock(FILE, 2);
2737 print FILE $proxysettings{'SRC_UNRESTRICTED_IP'};
2738 close(FILE);
2739
2740 open(FILE, ">$acl_src_unrestricted_mac");
2741 flock(FILE, 2);
2742 print FILE $proxysettings{'SRC_UNRESTRICTED_MAC'};
2743 close(FILE);
2744
2745 open(FILE, ">$acl_dst_noauth");
2746 flock(FILE, 2);
2747 print FILE $proxysettings{'DST_NOAUTH'};
2748 close(FILE);
2749
2750 open(FILE, ">$acl_dst_noproxy_ip");
2751 flock(FILE, 2);
2752 print FILE $proxysettings{'DST_NOPROXY_IP'};
2753 close(FILE);
2754
2755 open(FILE, ">$acl_dst_noproxy_url");
2756 flock(FILE, 2);
2757 print FILE $proxysettings{'DST_NOPROXY_URL'};
2758 close(FILE);
2759
2760 open(FILE, ">$acl_dst_noauth_net");
2761 close(FILE);
2762 open(FILE, ">$acl_dst_noauth_dom");
2763 close(FILE);
2764 open(FILE, ">$acl_dst_noauth_url");
2765 close(FILE);
2766
2767 @temp = split(/\n/,$proxysettings{'DST_NOAUTH'});
2768 foreach(@temp)
2769 {
2770 unless (/^#/)
2771 {
2772 if (/^\*\.\w/)
2773 {
2774 s/^\*//;
2775 open(FILE, ">>$acl_dst_noauth_dom");
2776 flock(FILE, 2);
2777 print FILE "$_\n";
2778 close(FILE);
2779 }
2780 elsif (&General::validipormask($_))
2781 {
2782 open(FILE, ">>$acl_dst_noauth_net");
2783 flock(FILE, 2);
2784 print FILE "$_\n";
2785 close(FILE);
2786 }
2787 elsif (/\d\d?\d?\.\d\d?\d?\.\d\d?\d?\.\d\d?\d?-\d\d?\d?\.\d\d?\d?\.\d\d?\d?\.\d\d?\d?/)
2788 {
2789 open(FILE, ">>$acl_dst_noauth_net");
2790 flock(FILE, 2);
2791 print FILE "$_\n";
2792 close(FILE);
2793 }
2794 else
2795 {
2796 open(FILE, ">>$acl_dst_noauth_url");
2797 flock(FILE, 2);
2798 if (/^[fh]tt?ps?:\/\//) { print FILE "$_\n"; } else { print FILE "^[fh]tt?ps?://$_\n"; }
2799 close(FILE);
2800 }
2801 }
2802 }
2803
2804 open(FILE, ">$acl_dst_nocache");
2805 flock(FILE, 2);
2806 print FILE $proxysettings{'DST_NOCACHE'};
2807 close(FILE);
2808
2809 open(FILE, ">$acl_dst_nocache_net");
2810 close(FILE);
2811 open(FILE, ">$acl_dst_nocache_dom");
2812 close(FILE);
2813 open(FILE, ">$acl_dst_nocache_url");
2814 close(FILE);
2815
2816 @temp = split(/\n/,$proxysettings{'DST_NOCACHE'});
2817 foreach(@temp)
2818 {
2819 unless (/^#/)
2820 {
2821 if (/^\*\.\w/)
2822 {
2823 s/^\*//;
2824 open(FILE, ">>$acl_dst_nocache_dom");
2825 flock(FILE, 2);
2826 print FILE "$_\n";
2827 close(FILE);
2828 }
2829 elsif (&General::validipormask($_))
2830 {
2831 open(FILE, ">>$acl_dst_nocache_net");
2832 flock(FILE, 2);
2833 print FILE "$_\n";
2834 close(FILE);
2835 }
2836 elsif (/\d\d?\d?\.\d\d?\d?\.\d\d?\d?\.\d\d?\d?-\d\d?\d?\.\d\d?\d?\.\d\d?\d?\.\d\d?\d?/)
2837 {
2838 open(FILE, ">>$acl_dst_nocache_net");
2839 flock(FILE, 2);
2840 print FILE "$_\n";
2841 close(FILE);
2842 }
2843 else
2844 {
2845 open(FILE, ">>$acl_dst_nocache_url");
2846 flock(FILE, 2);
2847 if (/^[fh]tt?ps?:\/\//) { print FILE "$_\n"; } else { print FILE "^[fh]tt?ps?://$_\n"; }
2848 close(FILE);
2849 }
2850 }
2851 }
2852
2853 open(FILE, ">$acl_ports_safe");
2854 flock(FILE, 2);
2855 if (!$proxysettings{'PORTS_SAFE'}) { print FILE $def_ports_safe; } else { print FILE $proxysettings{'PORTS_SAFE'}; }
2856 close(FILE);
2857
2858 open(FILE, ">$acl_ports_ssl");
2859 flock(FILE, 2);
2860 if (!$proxysettings{'PORTS_SSL'}) { print FILE $def_ports_ssl; } else { print FILE $proxysettings{'PORTS_SSL'}; }
2861 close(FILE);
2862
2863 if (-s $throttled_urls)
2864 {
2865 open(URLFILE, $throttled_urls);
2866 @temp = <URLFILE>;
2867 close(URLFILE);
2868 foreach (@temp) { print FILE; }
2869 }
2870 close(FILE);
2871
2872 open(FILE, ">$mimetypes");
2873 flock(FILE, 2);
2874 print FILE $proxysettings{'MIME_TYPES'};
2875 close(FILE);
2876
2877 open(FILE, ">$raddir/radauth.allowusers");
2878 flock(FILE, 2);
2879 print FILE $proxysettings{'RADIUS_ALLOW_USERS'};
2880 close(FILE);
2881
2882 open(FILE, ">$raddir/radauth.denyusers");
2883 flock(FILE, 2);
2884 print FILE $proxysettings{'RADIUS_DENY_USERS'};
2885 close(FILE);
2886
2887 open(FILE, ">$identdir/identauth.allowusers");
2888 flock(FILE, 2);
2889 print FILE $proxysettings{'IDENT_ALLOW_USERS'};
2890 close(FILE);
2891
2892 open(FILE, ">$identdir/identauth.denyusers");
2893 flock(FILE, 2);
2894 print FILE $proxysettings{'IDENT_DENY_USERS'};
2895 close(FILE);
2896
2897 open(FILE, ">$identhosts");
2898 flock(FILE, 2);
2899 print FILE $proxysettings{'IDENT_HOSTS'};
2900 close(FILE);
2901
2902 open(FILE, ">$cre_groups");
2903 flock(FILE, 2);
2904 print FILE $proxysettings{'CRE_GROUPS'};
2905 close(FILE);
2906
2907 open(FILE, ">$cre_svhosts");
2908 flock(FILE, 2);
2909 print FILE $proxysettings{'CRE_SVHOSTS'};
2910 close(FILE);
2911 }
2912
2913 # -------------------------------------------------------------------
2914
2915 sub writepacfile
2916 {
2917 my %vpnconfig=();
2918 my %ovpnconfig=();
2919 &General::readhasharray("${General::swroot}/vpn/config", \%vpnconfig);
2920 &General::readhasharray("${General::swroot}/ovpn/ovpnconfig", \%ovpnconfig);
2921 open(FILE, ">/srv/web/ipfire/html/proxy.pac");
2922 flock(FILE, 2);
2923 print FILE "function FindProxyForURL(url, host)\n";
2924 print FILE "{\n";
2925 if (($proxysettings{'ENABLE'} eq 'on') || ($proxysettings{'ENABLE_BLUE'} eq 'on'))
2926 {
2927 print FILE <<END
2928 if (
2929 (isPlainHostName(host)) ||
2930 (isInNet(host, "127.0.0.1", "255.0.0.0")) ||
2931 END
2932 ;
2933
2934 if ($netsettings{'GREEN_DEV'}) {
2935 print FILE " (isInNet(host, \"$netsettings{'GREEN_NETADDRESS'}\", \"$netsettings{'GREEN_NETMASK'}\")) ||\n";
2936 }
2937
2938 if (&Header::blue_used() && $netsettings{'BLUE_DEV'}) {
2939 print FILE " (isInNet(host, \"$netsettings{'BLUE_NETADDRESS'}\", \"$netsettings{'BLUE_NETMASK'}\")) ||\n";
2940 }
2941
2942 if (&Header::orange_used() && $netsettings{'ORANGE_DEV'}) {
2943 print FILE " (isInNet(host, \"$netsettings{'ORANGE_NETADDRESS'}\", \"$netsettings{'ORANGE_NETMASK'}\")) ||\n";
2944 }
2945
2946 # Additional exceptions for URLs
2947 # The file has to be created by the user and should contain one entry per line
2948 # Line-Format: <URL incl. wildcards>
2949 # e.g. *.ipfire.org*
2950 if (-s "$acl_dst_noproxy_url") {
2951 undef @templist;
2952
2953 open(NOPROXY,"$acl_dst_noproxy_url");
2954 @templist = <NOPROXY>;
2955 close(NOPROXY);
2956 chomp (@templist);
2957
2958 foreach (@templist)
2959 {
2960 print FILE " (shExpMatch(url, \"$_\")) ||\n";
2961 }
2962 }
2963
2964 # Additional exceptions for Subnets
2965 # The file has to be created by the user and should contain one entry per line
2966 # Line-Format: <IP>/<SUBNET MASK>
2967 # e.g. 192.168.0.0/255.255.255.0
2968 if (-s "$acl_dst_noproxy_ip") {
2969 undef @templist;
2970
2971 open(NOPROXY,"$acl_dst_noproxy_ip");
2972 @templist = <NOPROXY>;
2973 close(NOPROXY);
2974 chomp (@templist);
2975
2976 foreach (@templist)
2977 {
2978 @temp = split(/\//);
2979 print FILE " (isInNet(host, \"$temp[0]\", \"$temp[1]\")) ||\n";
2980 }
2981 }
2982
2983 foreach my $key (sort { uc($vpnconfig{$a}[1]) cmp uc($vpnconfig{$b}[1]) } keys %vpnconfig) {
2984 if ($vpnconfig{$key}[0] eq 'on' && $vpnconfig{$key}[3] ne 'host') {
2985 my @networks = split(/\|/, $vpnconfig{$key}[11]);
2986 foreach my $network (@networks) {
2987 my ($vpnip, $vpnsub) = split("/", $network);
2988 $vpnsub = &Network::convert_prefix2netmask($vpnsub) || $vpnsub;
2989 next if ($vpnip eq "0.0.0.0" || $vpnsub eq "0.0.0.0");
2990 print FILE " (isInNet(host, \"$vpnip\", \"$vpnsub\")) ||\n";
2991 }
2992 }
2993 }
2994
2995 foreach my $key (sort { uc($ovpnconfig{$a}[1]) cmp uc($ovpnconfig{$b}[1]) } keys %ovpnconfig) {
2996 if ($ovpnconfig{$key}[0] eq 'on' && $ovpnconfig{$key}[3] ne 'host') {
2997 my @networks = split(/\|/, $ovpnconfig{$key}[11]);
2998 foreach my $network (@networks) {
2999 my ($vpnip, $vpnsub) = split("/", $network);
3000 $vpnsub = &Network::convert_prefix2netmask($vpnsub) || $vpnsub;
3001 next if ($vpnip eq "0.0.0.0" || $vpnsub eq "0.0.0.0");
3002 print FILE " (isInNet(host, \"$vpnip\", \"$vpnsub\")) ||\n";
3003 }
3004 }
3005 }
3006
3007 print FILE <<END
3008 (isInNet(host, "169.254.0.0", "255.255.0.0"))
3009 )
3010 return "DIRECT";
3011
3012 else
3013
3014 END
3015 ;
3016 if ($proxysettings{'ENABLE'} eq 'on')
3017 {
3018 print FILE "if (\n";
3019 print FILE " (isInNet(myIpAddress(), \"$netsettings{'GREEN_NETADDRESS'}\", \"$netsettings{'GREEN_NETMASK'}\"))";
3020
3021 undef @templist;
3022 if (-e "$acl_src_subnets") {
3023 open(SUBNETS,"$acl_src_subnets");
3024 @templist = <SUBNETS>;
3025 close(SUBNETS);
3026 }
3027
3028 foreach (@templist)
3029 {
3030 @temp = split(/\//);
3031 if (
3032 ($temp[0] ne $netsettings{'GREEN_NETADDRESS'}) && ($temp[1] ne $netsettings{'GREEN_NETMASK'}) &&
3033 ($temp[0] ne $netsettings{'BLUE_NETADDRESS'}) && ($temp[1] ne $netsettings{'BLUE_NETMASK'})
3034 )
3035 {
3036 chomp $temp[1];
3037 my $tempmask = &Network::convert_prefix2netmask($temp[1]);
3038 print FILE " ||\n (isInNet(myIpAddress(), \"$temp[0]\", \"$tempmask\"))";
3039 }
3040 }
3041
3042 print FILE "\n";
3043
3044 print FILE <<END
3045 )
3046 return "PROXY $netsettings{'GREEN_ADDRESS'}:$proxysettings{'PROXY_PORT'}";
3047 END
3048 ;
3049 }
3050 if (($proxysettings{'ENABLE'} eq 'on') && ($proxysettings{'ENABLE_BLUE'} eq 'on') && ($netsettings{'BLUE_DEV'}))
3051 {
3052 print FILE "\n else\n\n";
3053 }
3054 if (($netsettings{'BLUE_DEV'}) && ($proxysettings{'ENABLE_BLUE'} eq 'on'))
3055 {
3056 print FILE <<END
3057 if (
3058 (isInNet(myIpAddress(), "$netsettings{'BLUE_NETADDRESS'}", "$netsettings{'BLUE_NETMASK'}"))
3059 )
3060 return "PROXY $netsettings{'BLUE_ADDRESS'}:$proxysettings{'PROXY_PORT'}";
3061 END
3062 ;
3063 }
3064 }
3065 print FILE "}\n";
3066 close(FILE);
3067 }
3068
3069 # -------------------------------------------------------------------
3070
3071 sub writeconfig
3072 {
3073 my $authrealm;
3074 my $delaypools;
3075
3076 if ($proxysettings{'THROTTLING_GREEN_TOTAL'} +
3077 $proxysettings{'THROTTLING_GREEN_HOST'} +
3078 $proxysettings{'THROTTLING_BLUE_TOTAL'} +
3079 $proxysettings{'THROTTLING_BLUE_HOST'} gt 0)
3080 {
3081 $delaypools = 1; } else { $delaypools = 0;
3082 }
3083
3084 if ($proxysettings{'AUTH_REALM'} eq '')
3085 {
3086 $authrealm = "IPFire Advanced Proxy Server";
3087 } else {
3088 $authrealm = $proxysettings{'AUTH_REALM'};
3089 }
3090
3091 $_ = $proxysettings{'UPSTREAM_PROXY'};
3092 my ($remotehost, $remoteport) = split(/:/,$_);
3093
3094 if ($remoteport eq '') { $remoteport = 80; }
3095
3096 open(FILE, ">${General::swroot}/proxy/squid.conf");
3097 flock(FILE, 2);
3098 print FILE <<END
3099 # Do not modify '${General::swroot}/proxy/squid.conf' directly since any changes
3100 # you make will be overwritten whenever you resave proxy settings using the
3101 # web interface!
3102 #
3103 # Instead, modify the file '$acl_include' and
3104 # then restart the proxy service using the web interface. Changes made to the
3105 # 'include.acl' file will propagate to the 'squid.conf' file at that time.
3106
3107 shutdown_lifetime 5 seconds
3108 icp_port 0
3109 httpd_suppress_version_string on
3110
3111 END
3112 ;
3113
3114 # Include file with user defined settings.
3115 if (-e "/etc/squid/squid.conf.pre.local") {
3116 print FILE "include /etc/squid/squid.conf.pre.local\n\n";
3117 }
3118
3119 if (&Header::green_used()) {
3120 print FILE "http_port $netsettings{'GREEN_ADDRESS'}:$proxysettings{'PROXY_PORT'}";
3121 } else {
3122 print FILE "http_port 0.0.0.0:$proxysettings{'PROXY_PORT'}";
3123 }
3124 if ($proxysettings{'NO_CONNECTION_AUTH'} eq 'on') { print FILE " no-connection-auth" }
3125 print FILE "\n";
3126
3127 if (&Header::green_used() && $proxysettings{'TRANSPARENT'} eq 'on') {
3128 print FILE "http_port $netsettings{'GREEN_ADDRESS'}:$proxysettings{'TRANSPARENT_PORT'} intercept";
3129 if ($proxysettings{'NO_CONNECTION_AUTH'} eq 'on') { print FILE " no-connection-auth" }
3130 print FILE "\n";
3131 }
3132
3133 if ($netsettings{'BLUE_DEV'} && $proxysettings{'ENABLE_BLUE'} eq 'on') {
3134 print FILE "http_port $netsettings{'BLUE_ADDRESS'}:$proxysettings{'PROXY_PORT'}";
3135 if ($proxysettings{'NO_CONNECTION_AUTH'} eq 'on') { print FILE " no-connection-auth" }
3136 print FILE "\n";
3137
3138 if ($proxysettings{'TRANSPARENT_BLUE'} eq 'on') {
3139 print FILE "http_port $netsettings{'BLUE_ADDRESS'}:$proxysettings{'TRANSPARENT_PORT'} intercept";
3140 if ($proxysettings{'NO_CONNECTION_AUTH'} eq 'on') { print FILE " no-connection-auth" }
3141 print FILE "\n";
3142 }
3143 }
3144
3145 if (($proxysettings{'CACHE_SIZE'} > 0) || ($proxysettings{'CACHE_MEM'} > 0))
3146 {
3147 print FILE "\n";
3148
3149 if (!-z $acl_dst_nocache_dom) {
3150 print FILE "acl no_cache_domains dstdomain \"$acl_dst_nocache_dom\"\n";
3151 print FILE "cache deny no_cache_domains\n";
3152 }
3153 if (!-z $acl_dst_nocache_net) {
3154 print FILE "acl no_cache_ipaddr dst \"$acl_dst_nocache_net\"\n";
3155 print FILE "cache deny no_cache_ipaddr\n";
3156 }
3157 if (!-z $acl_dst_nocache_url) {
3158 print FILE "acl no_cache_hosts url_regex -i \"$acl_dst_nocache_url\"\n";
3159 print FILE "cache deny no_cache_hosts\n";
3160 }
3161 }
3162
3163 print FILE <<END
3164
3165 cache_effective_user squid
3166 umask 022
3167
3168 pid_filename /var/run/squid.pid
3169
3170 cache_mem $proxysettings{'CACHE_MEM'} MB
3171 END
3172 ;
3173 print FILE "error_directory $errordir/$proxysettings{'ERR_LANGUAGE'}\n\n";
3174
3175 if ($proxysettings{'OFFLINE_MODE'} eq 'on') { print FILE "offline_mode on\n\n"; }
3176 if ($proxysettings{'CACHE_DIGESTS'} eq 'on') { print FILE "digest_generation on\n\n"; } else { print FILE "digest_generation off\n\n"; }
3177
3178 if ((!($proxysettings{'MEM_POLICY'} eq 'LRU')) || (!($proxysettings{'CACHE_POLICY'} eq 'LRU')))
3179 {
3180 if (!($proxysettings{'MEM_POLICY'} eq 'LRU'))
3181 {
3182 print FILE "memory_replacement_policy $proxysettings{'MEM_POLICY'}\n";
3183 }
3184 if (!($proxysettings{'CACHE_POLICY'} eq 'LRU'))
3185 {
3186 print FILE "cache_replacement_policy $proxysettings{'CACHE_POLICY'}\n";
3187 }
3188 print FILE "\n";
3189 }
3190
3191 open (PORTS,"$acl_ports_ssl");
3192 my @ssl_ports = <PORTS>;
3193 close PORTS;
3194
3195 if (@ssl_ports) {
3196 foreach (@ssl_ports) {
3197 print FILE "acl SSL_ports port $_";
3198 }
3199 }
3200
3201 open (PORTS,"$acl_ports_safe");
3202 my @safe_ports = <PORTS>;
3203 close PORTS;
3204
3205 if (@safe_ports) {
3206 foreach (@safe_ports) {
3207 print FILE "acl Safe_ports port $_";
3208 }
3209 }
3210
3211 print FILE <<END;
3212 acl IPFire_ips dst 127.0.0.1
3213 acl IPFire_http port $http_port
3214 acl IPFire_https port $https_port
3215 acl IPFire_networks src "$acl_src_subnets"
3216 acl IPFire_servers dst "$acl_src_subnets"
3217 END
3218 if (&Header::green_used()) {
3219 print FILE <<END;
3220 acl IPFire_ips dst $netsettings{'GREEN_ADDRESS'}
3221 acl IPFire_green_network src $green_cidr
3222 acl IPFire_green_servers dst $green_cidr
3223 END
3224 }
3225 if ($netsettings{'BLUE_DEV'}) { print FILE "acl IPFire_blue_network src $blue_cidr\n"; }
3226 if ($netsettings{'BLUE_DEV'}) { print FILE "acl IPFire_blue_servers dst $blue_cidr\n"; }
3227 if (!-z $acl_src_banned_ip) { print FILE "acl IPFire_banned_ips src \"$acl_src_banned_ip\"\n"; }
3228 if (!-z $acl_src_banned_mac) { print FILE "acl IPFire_banned_mac arp \"$acl_src_banned_mac\"\n"; }
3229 if (!-z $acl_src_unrestricted_ip) { print FILE "acl IPFire_unrestricted_ips src \"$acl_src_unrestricted_ip\"\n"; }
3230 if (!-z $acl_src_unrestricted_mac) { print FILE "acl IPFire_unrestricted_mac arp \"$acl_src_unrestricted_mac\"\n"; }
3231 print FILE <<END
3232 acl CONNECT method CONNECT
3233 END
3234 ;
3235
3236 if ($proxysettings{'CACHE_SIZE'} > 0) {
3237 print FILE <<END
3238 maximum_object_size $proxysettings{'MAX_SIZE'} KB
3239 minimum_object_size $proxysettings{'MIN_SIZE'} KB
3240
3241 cache_dir aufs /var/log/cache $proxysettings{'CACHE_SIZE'} $proxysettings{'L1_DIRS'} 256
3242 END
3243 ;
3244 } else {
3245 if ($proxysettings{'CACHE_MEM'} > 0) {
3246 # always 2% of CACHE_MEM defined as max object size
3247 print FILE "maximum_object_size_in_memory " . int($proxysettings{'CACHE_MEM'} * 1024 * 0.02) . " KB\n\n";
3248 } else {
3249 print FILE "cache deny all\n\n";
3250 }
3251 }
3252
3253 print FILE <<END
3254 request_body_max_size $proxysettings{'MAX_OUTGOING_SIZE'} KB
3255 END
3256 ;
3257
3258 if ($proxysettings{'MAX_INCOMING_SIZE'} > 0) {
3259 if (!-z $acl_src_unrestricted_ip) { print FILE "reply_body_max_size none IPFire_unrestricted_ips\n"; }
3260 if (!-z $acl_src_unrestricted_mac) { print FILE "reply_body_max_size none IPFire_unrestricted_mac\n"; }
3261 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
3262 {
3263 if (!-z $extgrp) { print FILE "reply_body_max_size none for_extended_users\n"; }
3264 }
3265 }
3266
3267 if ( $proxysettings{'MAX_INCOMING_SIZE'} != '0' )
3268 {
3269 print FILE "reply_body_max_size $proxysettings{'MAX_INCOMING_SIZE'} KB all\n\n";
3270 }
3271
3272 if ($proxysettings{'LOGGING'} eq 'on')
3273 {
3274 print FILE <<END
3275 access_log stdio:/var/log/squid/access.log
3276 cache_log /var/log/squid/cache.log
3277 cache_store_log none
3278 END
3279 ;
3280 if ($proxysettings{'LOGUSERAGENT'} eq 'on') { print FILE "access_log stdio:\/var\/log\/squid\/user_agent.log useragent\n"; }
3281 if ($proxysettings{'LOGQUERY'} eq 'on') { print FILE "\nstrip_query_terms off\n"; }
3282 } else {
3283 print FILE <<END
3284 access_log /dev/null
3285 cache_log /dev/null
3286 cache_store_log none
3287 END
3288 ;}
3289 print FILE <<END
3290
3291 log_mime_hdrs off
3292 END
3293 ;
3294
3295 if ($proxysettings{'FORWARD_IPADDRESS'} eq 'on')
3296 {
3297 print FILE "forwarded_for on\n";
3298 } else {
3299 print FILE "forwarded_for off\n";
3300 }
3301 if ($proxysettings{'FORWARD_VIA'} eq 'on')
3302 {
3303 print FILE "via on\n";
3304 } else {
3305 print FILE "via off\n";
3306 }
3307 print FILE "\n";
3308
3309 if ((!($proxysettings{'AUTH_METHOD'} eq 'none')) && (!($proxysettings{'AUTH_METHOD'} eq 'ident')))
3310 {
3311 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
3312 {
3313 print FILE "auth_param basic program $authdir/basic_ncsa_auth $userdb\n";
3314 print FILE "auth_param basic children $proxysettings{'AUTH_CHILDREN'}\n";
3315 print FILE "auth_param basic realm $authrealm\n";
3316 print FILE "auth_param basic credentialsttl $proxysettings{'AUTH_CACHE_TTL'} minutes\n";
3317 if (!($proxysettings{'AUTH_IPCACHE_TTL'} eq '0')) { print FILE "\nauthenticate_ip_ttl $proxysettings{'AUTH_IPCACHE_TTL'} minutes\n"; }
3318 }
3319
3320 if ($proxysettings{'AUTH_METHOD'} eq 'ldap')
3321 {
3322 print FILE "auth_param basic utf8 on\n";
3323 print FILE "auth_param basic program $authdir/basic_ldap_auth -b \"$proxysettings{'LDAP_BASEDN'}\"";
3324 if (!($proxysettings{'LDAP_BINDDN_USER'} eq '')) { print FILE " -D \"$proxysettings{'LDAP_BINDDN_USER'}\""; }
3325 if (!($proxysettings{'LDAP_BINDDN_PASS'} eq '')) { print FILE " -w $proxysettings{'LDAP_BINDDN_PASS'}"; }
3326 if ($proxysettings{'LDAP_TYPE'} eq 'ADS')
3327 {
3328 if ($proxysettings{'LDAP_GROUP'} eq '')
3329 {
3330 print FILE " -f \"(\&(objectClass=person)(sAMAccountName=\%s))\"";
3331 } else {
3332 print FILE " -f \"(\&(\&(objectClass=person)(sAMAccountName=\%s))(memberOf=$proxysettings{'LDAP_GROUP'}))\"";
3333 }
3334 print FILE " -u sAMAccountName -P";
3335 }
3336 if ($proxysettings{'LDAP_TYPE'} eq 'NDS')
3337 {
3338 if ($proxysettings{'LDAP_GROUP'} eq '')
3339 {
3340 print FILE " -f \"(\&(objectClass=person)(cn=\%s))\"";
3341 } else {
3342 print FILE " -f \"(\&(\&(objectClass=person)(cn=\%s))(groupMembership=$proxysettings{'LDAP_GROUP'}))\"";
3343 }
3344 print FILE " -u cn -P";
3345 }
3346 if (($proxysettings{'LDAP_TYPE'} eq 'V2') || ($proxysettings{'LDAP_TYPE'} eq 'V3'))
3347 {
3348 if ($proxysettings{'LDAP_GROUP'} eq '')
3349 {
3350 print FILE " -f \"(\&(objectClass=person)(uid=\%s))\"";
3351 } else {
3352 print FILE " -f \"(\&(\&(objectClass=person)(uid=\%s))(memberOf=$proxysettings{'LDAP_GROUP'}))\"";
3353 }
3354 if ($proxysettings{'LDAP_TYPE'} eq 'V2') { print FILE " -v 2"; }
3355 if ($proxysettings{'LDAP_TYPE'} eq 'V3') { print FILE " -v 3"; }
3356 print FILE " -u uid -P";
3357 }
3358 print FILE " $proxysettings{'LDAP_SERVER'}:$proxysettings{'LDAP_PORT'}\n";
3359 print FILE "auth_param basic children $proxysettings{'AUTH_CHILDREN'}\n";
3360 print FILE "auth_param basic realm $authrealm\n";
3361 print FILE "auth_param basic credentialsttl $proxysettings{'AUTH_CACHE_TTL'} minutes\n";
3362 if (!($proxysettings{'AUTH_IPCACHE_TTL'} eq '0')) { print FILE "\nauthenticate_ip_ttl $proxysettings{'AUTH_IPCACHE_TTL'} minutes\n"; }
3363 }
3364
3365 if ($proxysettings{'AUTH_METHOD'} eq 'ntlm-auth')
3366 {
3367 print FILE "auth_param ntlm program /usr/bin/ntlm_auth --helper-protocol=squid-2.5-ntlmssp";
3368 if ($proxysettings{'NTLM_AUTH_GROUP'}) {
3369 my $ntlm_auth_group = $proxysettings{'NTLM_AUTH_GROUP'};
3370 $ntlm_auth_group =~ s/\\/\+/;
3371
3372 print FILE " --require-membership-of=$ntlm_auth_group";
3373 }
3374 print FILE "\n";
3375
3376 print FILE "auth_param ntlm children $proxysettings{'AUTH_CHILDREN'}\n\n";
3377 print FILE "auth_param ntlm credentialsttl $proxysettings{'AUTH_CACHE_TTL'} minutes\n\n";
3378
3379 # BASIC authentication
3380 if ($proxysettings{'NTLM_AUTH_BASIC'} eq "on") {
3381 print FILE "auth_param basic program /usr/bin/ntlm_auth --helper-protocol=squid-2.5-basic";
3382 if ($proxysettings{'NTLM_AUTH_GROUP'}) {
3383 my $ntlm_auth_group = $proxysettings{'NTLM_AUTH_GROUP'};
3384 $ntlm_auth_group =~ s/\\/\+/;
3385
3386 print FILE " --require-membership-of=$ntlm_auth_group";
3387 }
3388 print FILE "\n";
3389 print FILE "auth_param basic children $proxysettings{'AUTH_CHILDREN'}\n";
3390 print FILE "auth_param basic realm $authrealm\n";
3391 print FILE "auth_param basic credentialsttl $proxysettings{'AUTH_CACHE_TTL'} minutes\n\n";
3392 }
3393 }
3394
3395 if ($proxysettings{'AUTH_METHOD'} eq 'radius')
3396 {
3397 print FILE "auth_param basic program $authdir/basic_radius_auth -h $proxysettings{'RADIUS_SERVER'} -p $proxysettings{'RADIUS_PORT'} ";
3398 if (!($proxysettings{'RADIUS_IDENTIFIER'} eq '')) { print FILE "-i $proxysettings{'RADIUS_IDENTIFIER'} "; }
3399 print FILE "-w $proxysettings{'RADIUS_SECRET'}\n";
3400 print FILE "auth_param basic children $proxysettings{'AUTH_CHILDREN'}\n";
3401 print FILE "auth_param basic realm $authrealm\n";
3402 print FILE "auth_param basic credentialsttl $proxysettings{'AUTH_CACHE_TTL'} minutes\n";
3403 if (!($proxysettings{'AUTH_IPCACHE_TTL'} eq '0')) { print FILE "\nauthenticate_ip_ttl $proxysettings{'AUTH_IPCACHE_TTL'} minutes\n"; }
3404 }
3405
3406 print FILE "\n";
3407 print FILE "acl for_inetusers proxy_auth REQUIRED\n";
3408 if (($proxysettings{'AUTH_METHOD'} eq 'radius') && ($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on'))
3409 {
3410 if ((!-z "$raddir/radauth.allowusers") && ($proxysettings{'RADIUS_USER_ACL'} eq 'positive'))
3411 {
3412 print FILE "acl for_acl_users proxy_auth \"$raddir/radauth.allowusers\"\n";
3413 }
3414 if ((!-z "$raddir/radauth.denyusers") && ($proxysettings{'RADIUS_USER_ACL'} eq 'negative'))
3415 {
3416 print FILE "acl for_acl_users proxy_auth \"$raddir/radauth.denyusers\"\n";
3417 }
3418 }
3419 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
3420 {
3421 print FILE "\n";
3422 if (!-z $extgrp) { print FILE "acl for_extended_users proxy_auth \"$extgrp\"\n"; }
3423 if (!-z $disgrp) { print FILE "acl for_disabled_users proxy_auth \"$disgrp\"\n"; }
3424 }
3425 if (!($proxysettings{'AUTH_MAX_USERIP'} eq '')) { print FILE "\nacl concurrent max_user_ip -s $proxysettings{'AUTH_MAX_USERIP'}\n"; }
3426 print FILE "\n";
3427
3428 if (!-z $acl_dst_noauth_net) { print FILE "acl to_ipaddr_without_auth dst \"$acl_dst_noauth_net\"\n"; }
3429 if (!-z $acl_dst_noauth_dom) { print FILE "acl to_domains_without_auth dstdomain \"$acl_dst_noauth_dom\"\n"; }
3430 if (!-z $acl_dst_noauth_url) { print FILE "acl to_hosts_without_auth url_regex -i \"$acl_dst_noauth_url\"\n"; }
3431 print FILE "\n";
3432
3433 }
3434
3435 if ($proxysettings{'AUTH_METHOD'} eq 'ident')
3436 {
3437 if ($proxysettings{'IDENT_REQUIRED'} eq 'on')
3438 {
3439 print FILE "acl for_inetusers ident REQUIRED\n";
3440 }
3441 if ($proxysettings{'IDENT_ENABLE_ACL'} eq 'on')
3442 {
3443 if ((!-z "$identdir/identauth.allowusers") && ($proxysettings{'IDENT_USER_ACL'} eq 'positive'))
3444 {
3445 print FILE "acl for_acl_users ident_regex -i \"$identdir/identauth.allowusers\"\n\n";
3446 }
3447 if ((!-z "$identdir/identauth.denyusers") && ($proxysettings{'IDENT_USER_ACL'} eq 'negative'))
3448 {
3449 print FILE "acl for_acl_users ident_regex -i \"$identdir/identauth.denyusers\"\n\n";
3450 }
3451 }
3452 if (!-z $acl_dst_noauth_net) { print FILE "acl to_ipaddr_without_auth dst \"$acl_dst_noauth_net\"\n"; }
3453 if (!-z $acl_dst_noauth_dom) { print FILE "acl to_domains_without_auth dstdomain \"$acl_dst_noauth_dom\"\n"; }
3454 if (!-z $acl_dst_noauth_url) { print FILE "acl to_hosts_without_auth url_regex -i \"$acl_dst_noauth_url\"\n"; }
3455 print FILE "\n";
3456 }
3457
3458 if (($delaypools) && (!-z $acl_dst_throttle)) { print FILE "acl for_throttled_urls url_regex -i \"$acl_dst_throttle\"\n\n"; }
3459
3460 print FILE "acl within_timeframe time ";
3461 if ($proxysettings{'TIME_MON'} eq 'on') { print FILE "M"; }
3462 if ($proxysettings{'TIME_TUE'} eq 'on') { print FILE "T"; }
3463 if ($proxysettings{'TIME_WED'} eq 'on') { print FILE "W"; }
3464 if ($proxysettings{'TIME_THU'} eq 'on') { print FILE "H"; }
3465 if ($proxysettings{'TIME_FRI'} eq 'on') { print FILE "F"; }
3466 if ($proxysettings{'TIME_SAT'} eq 'on') { print FILE "A"; }
3467 if ($proxysettings{'TIME_SUN'} eq 'on') { print FILE "S"; }
3468 print FILE " $proxysettings{'TIME_FROM_HOUR'}:";
3469 print FILE "$proxysettings{'TIME_FROM_MINUTE'}-";
3470 print FILE "$proxysettings{'TIME_TO_HOUR'}:";
3471 print FILE "$proxysettings{'TIME_TO_MINUTE'}\n\n";
3472
3473 if ((!-z $mimetypes) && ($proxysettings{'ENABLE_MIME_FILTER'} eq 'on')) {
3474 print FILE "acl blocked_mimetypes rep_mime_type \"$mimetypes\"\n\n";
3475 }
3476
3477 if ($proxysettings{'CLASSROOM_EXT'} eq 'on') {
3478 print FILE <<END
3479
3480 #Classroom extensions
3481 acl IPFire_no_access_ips src "$acl_src_noaccess_ip"
3482 acl IPFire_no_access_mac arp "$acl_src_noaccess_mac"
3483 END
3484 ;
3485 print FILE "deny_info ";
3486 if (($proxysettings{'ERR_DESIGN'} eq 'squid') && (-e "$errordir/$proxysettings{'ERR_LANGUAGE'}/ERR_ACCESS_DISABLED"))
3487 {
3488 print FILE "ERR_ACCESS_DISABLED";
3489 } else {
3490 print FILE "ERR_ACCESS_DENIED";
3491 }
3492 print FILE " IPFire_no_access_ips\n";
3493 print FILE "deny_info ";
3494 if (($proxysettings{'ERR_DESIGN'} eq 'squid') && (-e "$errordir/$proxysettings{'ERR_LANGUAGE'}/ERR_ACCESS_DISABLED"))
3495 {
3496 print FILE "ERR_ACCESS_DISABLED";
3497 } else {
3498 print FILE "ERR_ACCESS_DENIED";
3499 }
3500 print FILE " IPFire_no_access_mac\n";
3501
3502 print FILE <<END
3503 http_access deny IPFire_no_access_ips
3504 http_access deny IPFire_no_access_mac
3505 END
3506 ;
3507 }
3508
3509 #Insert acl file and replace __VAR__ with correct values
3510 my $blue_net = ''; #BLUE empty by default
3511 my $blue_ip = '';
3512 if ($netsettings{'BLUE_DEV'} && $proxysettings{'ENABLE_BLUE'} eq 'on') {
3513 $blue_net = "$blue_cidr";
3514 $blue_ip = "$netsettings{'BLUE_ADDRESS'}";
3515 }
3516 if (!-z $acl_include)
3517 {
3518 open (ACL, "$acl_include");
3519 print FILE "\n#Start of custom includes\n\n";
3520 while (<ACL>) {
3521 $_ =~ s/__GREEN_IP__/$netsettings{'GREEN_ADDRESS'}/;
3522 $_ =~ s/__GREEN_NET__/$green_cidr/;
3523 $_ =~ s/__BLUE_IP__/$blue_ip/;
3524 $_ =~ s/__BLUE_NET__/$blue_net/;
3525 $_ =~ s/__PROXY_PORT__/$proxysettings{'PROXY_PORT'}/;
3526 print FILE $_;
3527 }
3528 print FILE "\n#End of custom includes\n";
3529 close (ACL);
3530 }
3531 if ((!-z $extgrp) && ($proxysettings{'AUTH_METHOD'} eq 'ncsa') && ($proxysettings{'NCSA_BYPASS_REDIR'} eq 'on')) { print FILE "\nredirector_access deny for_extended_users\n"; }
3532
3533 # Check if squidclamav is enabled.
3534 if ($proxysettings{'ENABLE_CLAMAV'} eq 'on') {
3535 print FILE "\n#Settings for squidclamav:\n";
3536 print FILE "http_port 127.0.0.1:$proxysettings{'PROXY_PORT'}\n";
3537 print FILE "acl purge method PURGE\n";
3538 print FILE "http_access deny to_localhost\n";
3539 print FILE "http_access allow localhost\n";
3540 print FILE "http_access allow purge localhost\n";
3541 print FILE "http_access deny purge\n";
3542 print FILE "url_rewrite_access deny localhost\n";
3543 }
3544 print FILE <<END;
3545
3546 #Access to squid:
3547 #local machine, no restriction
3548 http_access allow localhost
3549
3550 #GUI admin if local machine connects
3551 http_access allow IPFire_ips IPFire_networks IPFire_http
3552 http_access allow CONNECT IPFire_ips IPFire_networks IPFire_https
3553
3554 #Deny not web services
3555 END
3556
3557 if (@safe_ports) {
3558 print FILE "http_access deny !Safe_ports\n";
3559 }
3560
3561 if (@ssl_ports) {
3562 print FILE "http_access deny CONNECT !SSL_ports\n";
3563 }
3564
3565 if ((($proxysettings{'ASNBL_FASTFLUX_DETECTION'} eq 'on') && (!-z $proxysettings{'ASNBL_FASTFLUX_THRESHOLD'})) || ($proxysettings{'ASNBL_SELECANN_DETECTION'} eq 'on')) {
3566 print FILE "external_acl_type asnblhelper children-max=10 children-startup=2 ttl=86400 %DST /usr/bin/asnbl-helper.py ${General::swroot}/proxy/asnbl-helper.conf\n";
3567 print FILE "acl asnbl external asnblhelper\n";
3568
3569 # Use the user-defined URL filter whitelist (if present and populated) for the ASNBL helper as well
3570 # Necessary for destinations such as fedoraproject.org, but we do not want to maintain a dedicated
3571 # or hardcoded list for such FQDNs.
3572 if ((-e "${General::swroot}/urlfilter/blacklists/custom/allowed/domains") && (!-z "${General::swroot}/urlfilter/blacklists/custom/allowed/domains")) {
3573 print FILE "acl asnbl_whitelisted_destinations dstdomain \"${General::swroot}/urlfilter/blacklists/custom/allowed/domains\"\n";
3574 print FILE "http_access deny asnbl !asnbl_whitelisted_destinations\n\n";
3575 } else {
3576 print FILE "http_access deny asnbl\n\n";
3577 }
3578
3579 # Write ASNBL helper configuration file...
3580 open(ASNBLFILE, ">${General::swroot}/proxy/asnbl-helper.conf");
3581 flock(ASNBLFILE, 2);
3582
3583 print ASNBLFILE<<END
3584 #
3585 # This file has been automatically generated. Manual changes will be overwritten.
3586 #
3587
3588 [GENERAL]
3589 LOGLEVEL = INFO
3590 ASNDB_PATH = /var/lib/location/database.db
3591 USE_REPLYMAP = no
3592 END
3593 ;
3594
3595 print ASNBLFILE "AS_DIVERSITY_THRESHOLD = $proxysettings{'ASNBL_FASTFLUX_THRESHOLD'}\n";
3596
3597 if ($proxysettings{'ASNBL_SELECANN_DETECTION'} eq 'on') {
3598 print ASNBLFILE "BLOCK_SUSPECTED_SELECTIVE_ANNOUNCEMENTS = yes\n";
3599 } else {
3600 print ASNBLFILE "BLOCK_SUSPECTED_SELECTIVE_ANNOUNCEMENTS = no\n";
3601 }
3602
3603 if ($proxysettings{'ASNBL_FASTFLUX_DETECTION'} eq 'on') {
3604 print ASNBLFILE "BLOCK_DIVERSITY_EXCEEDING_DESTINATIONS = yes\n";
3605 } else {
3606 print ASNBLFILE "BLOCK_DIVERSITY_EXCEEDING_DESTINATIONS = no\n";
3607 }
3608
3609 print ASNBLFILE<<END
3610 TESTDATA = (10.0.0.1, 0) (127.0.0.1, 0) (fe80::1, 0)
3611 ACTIVE_ASNBLS =
3612 END
3613 ;
3614
3615 close ASNBLFILE;
3616 }
3617
3618 if ($proxysettings{'AUTH_METHOD'} eq 'ident')
3619 {
3620 print FILE "#Set ident ACLs\n";
3621 if (!-z $identhosts)
3622 {
3623 print FILE "acl on_ident_aware_hosts src \"$identhosts\"\n";
3624 print FILE "ident_lookup_access allow on_ident_aware_hosts\n";
3625 print FILE "ident_lookup_access deny all\n";
3626 } else {
3627 print FILE "ident_lookup_access allow all\n";
3628 }
3629 print FILE "ident_timeout $proxysettings{'IDENT_TIMEOUT'} seconds\n\n";
3630 }
3631
3632 if ($delaypools) {
3633 print FILE "#Set download throttling\n";
3634
3635 if ($netsettings{'BLUE_DEV'})
3636 {
3637 print FILE "delay_pools 2\n";
3638 } else {
3639 print FILE "delay_pools 1\n";
3640 }
3641
3642 print FILE "delay_class 1 3\n";
3643 if ($netsettings{'BLUE_DEV'}) { print FILE "delay_class 2 3\n"; }
3644
3645 print FILE "delay_parameters 1 ";
3646 if ($proxysettings{'THROTTLING_GREEN_TOTAL'} eq 'unlimited')
3647 {
3648 print FILE "-1/-1";
3649 } else {
3650 print FILE $proxysettings{'THROTTLING_GREEN_TOTAL'} * 125;
3651 print FILE "/";
3652 print FILE $proxysettings{'THROTTLING_GREEN_TOTAL'} * 250;
3653 }
3654
3655 print FILE " -1/-1 ";
3656 if ($proxysettings{'THROTTLING_GREEN_HOST'} eq 'unlimited')
3657 {
3658 print FILE "-1/-1";
3659 } else {
3660 print FILE $proxysettings{'THROTTLING_GREEN_HOST'} * 125;
3661 print FILE "/";
3662 print FILE $proxysettings{'THROTTLING_GREEN_HOST'} * 250;
3663 }
3664 print FILE "\n";
3665
3666 if ($netsettings{'BLUE_DEV'})
3667 {
3668 print FILE "delay_parameters 2 ";
3669 if ($proxysettings{'THROTTLING_BLUE_TOTAL'} eq 'unlimited')
3670 {
3671 print FILE "-1/-1";
3672 } else {
3673 print FILE $proxysettings{'THROTTLING_BLUE_TOTAL'} * 125;
3674 print FILE "/";
3675 print FILE $proxysettings{'THROTTLING_BLUE_TOTAL'} * 250;
3676 }
3677 print FILE " -1/-1 ";
3678 if ($proxysettings{'THROTTLING_BLUE_HOST'} eq 'unlimited')
3679 {
3680 print FILE "-1/-1";
3681 } else {
3682 print FILE $proxysettings{'THROTTLING_BLUE_HOST'} * 125;
3683 print FILE "/";
3684 print FILE $proxysettings{'THROTTLING_BLUE_HOST'} * 250;
3685 }
3686 print FILE "\n";
3687 }
3688
3689 print FILE "delay_access 1 deny IPFire_ips\n";
3690 if (!-z $acl_src_unrestricted_ip) { print FILE "delay_access 1 deny IPFire_unrestricted_ips\n"; }
3691 if (!-z $acl_src_unrestricted_mac) { print FILE "delay_access 1 deny IPFire_unrestricted_mac\n"; }
3692 if (($proxysettings{'AUTH_METHOD'} eq 'ncsa') && (!-z $extgrp)) { print FILE "delay_access 1 deny for_extended_users\n"; }
3693
3694 if ($netsettings{'BLUE_DEV'})
3695 {
3696 if (&Header::green_used()) {
3697 print FILE "delay_access 1 allow IPFire_green_network";
3698 if (!-z $acl_dst_throttle) { print FILE " for_throttled_urls"; }
3699 print FILE "\n";
3700 }
3701 print FILE "delay_access 1 deny all\n";
3702 } else {
3703 print FILE "delay_access 1 allow all";
3704 if (!-z $acl_dst_throttle) { print FILE " for_throttled_urls"; }
3705 print FILE "\n";
3706 }
3707
3708 if ($netsettings{'BLUE_DEV'})
3709 {
3710 print FILE "delay_access 2 deny IPFire_ips\n";
3711 if (!-z $acl_src_unrestricted_ip) { print FILE "delay_access 2 deny IPFire_unrestricted_ips\n"; }
3712 if (!-z $acl_src_unrestricted_mac) { print FILE "delay_access 2 deny IPFire_unrestricted_mac\n"; }
3713 if (($proxysettings{'AUTH_METHOD'} eq 'ncsa') && (!-z $extgrp)) { print FILE "delay_access 2 deny for_extended_users\n"; }
3714 print FILE "delay_access 2 allow IPFire_blue_network";
3715 if (!-z $acl_dst_throttle) { print FILE " for_throttled_urls"; }
3716 print FILE "\n";
3717 print FILE "delay_access 2 deny all\n";
3718 }
3719
3720 print FILE "delay_initial_bucket_level 100\n";
3721 print FILE "\n";
3722 }
3723
3724 if (&Header::green_used() && $proxysettings{'NO_PROXY_LOCAL'} eq 'on')
3725 {
3726 print FILE "#Prevent internal proxy access to Green except IPFire itself\n";
3727 print FILE "http_access deny IPFire_green_servers !IPFire_ips !IPFire_green_network\n\n";
3728 }
3729
3730 if ($proxysettings{'NO_PROXY_LOCAL_BLUE'} eq 'on')
3731 {
3732 print FILE "#Prevent internal proxy access from Blue except IPFire itself\n";
3733 print FILE "http_access allow IPFire_blue_network IPFire_blue_servers\n";
3734 print FILE "http_access deny IPFire_blue_network !IPFire_ips IPFire_servers\n\n";
3735 }
3736
3737 print FILE <<END
3738 #Set custom configured ACLs
3739 END
3740 ;
3741 if (!-z $acl_src_banned_ip) { print FILE "http_access deny IPFire_banned_ips\n"; }
3742 if (!-z $acl_src_banned_mac) { print FILE "http_access deny IPFire_banned_mac\n"; }
3743
3744 if ((!-z $acl_dst_noauth) && (!($proxysettings{'AUTH_METHOD'} eq 'none')))
3745 {
3746 if (!-z $acl_src_unrestricted_ip)
3747 {
3748 if (!-z $acl_dst_noauth_net) { print FILE "http_access allow IPFire_unrestricted_ips to_ipaddr_without_auth\n"; }
3749 if (!-z $acl_dst_noauth_dom) { print FILE "http_access allow IPFire_unrestricted_ips to_domains_without_auth\n"; }
3750 if (!-z $acl_dst_noauth_url) { print FILE "http_access allow IPFire_unrestricted_ips to_hosts_without_auth\n"; }
3751 }
3752 if (!-z $acl_src_unrestricted_mac)
3753 {
3754 if (!-z $acl_dst_noauth_net) { print FILE "http_access allow IPFire_unrestricted_mac to_ipaddr_without_auth\n"; }
3755 if (!-z $acl_dst_noauth_dom) { print FILE "http_access allow IPFire_unrestricted_mac to_domains_without_auth\n"; }
3756 if (!-z $acl_dst_noauth_url) { print FILE "http_access allow IPFire_unrestricted_mac to_hosts_without_auth\n"; }
3757 }
3758 if (!-z $acl_dst_noauth_net)
3759 {
3760 print FILE "http_access allow IPFire_networks";
3761 if ($proxysettings{'TIME_ACCESS_MODE'} eq 'deny') {
3762 print FILE " !within_timeframe";
3763 } else {
3764 print FILE " within_timeframe"; }
3765 print FILE " to_ipaddr_without_auth\n";
3766 }
3767 if (!-z $acl_dst_noauth_dom)
3768 {
3769 print FILE "http_access allow IPFire_networks";
3770 if ($proxysettings{'TIME_ACCESS_MODE'} eq 'deny') {
3771 print FILE " !within_timeframe";
3772 } else {
3773 print FILE " within_timeframe"; }
3774 print FILE " to_domains_without_auth\n";
3775 }
3776 if (!-z $acl_dst_noauth_url)
3777 {
3778 print FILE "http_access allow IPFire_networks";
3779 if ($proxysettings{'TIME_ACCESS_MODE'} eq 'deny') {
3780 print FILE " !within_timeframe";
3781 } else {
3782 print FILE " within_timeframe"; }
3783 print FILE " to_hosts_without_auth\n";
3784 }
3785 }
3786
3787 if (($proxysettings{'AUTH_METHOD'} eq 'ident') && ($proxysettings{'IDENT_REQUIRED'} eq 'on') && ($proxysettings{'AUTH_ALWAYS_REQUIRED'} eq 'on'))
3788 {
3789 print FILE "http_access deny !for_inetusers";
3790 if (!-z $identhosts) { print FILE " on_ident_aware_hosts"; }
3791 print FILE "\n";
3792 }
3793
3794 if (
3795 ($proxysettings{'AUTH_METHOD'} eq 'ident') &&
3796 ($proxysettings{'AUTH_ALWAYS_REQUIRED'} eq 'on') &&
3797 ($proxysettings{'IDENT_ENABLE_ACL'} eq 'on') &&
3798 ($proxysettings{'IDENT_USER_ACL'} eq 'negative') &&
3799 (!-z "$identdir/identauth.denyusers")
3800 )
3801 {
3802 print FILE "http_access deny for_acl_users";
3803 if (($proxysettings{'AUTH_METHOD'} eq 'ident') && (!-z "$identdir/hosts")) { print FILE " on_ident_aware_hosts"; }
3804 print FILE "\n";
3805 }
3806
3807 if (!-z $acl_src_unrestricted_ip)
3808 {
3809 print FILE "http_access allow IPFire_unrestricted_ips";
3810 if ($proxysettings{'AUTH_ALWAYS_REQUIRED'} eq 'on')
3811 {
3812 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
3813 {
3814 if (!-z $disgrp) { print FILE " !for_disabled_users"; } else { print FILE " for_inetusers"; }
3815 }
3816 if (($proxysettings{'AUTH_METHOD'} eq 'ldap') || ($proxysettings{'AUTH_METHOD'} eq 'radius'))
3817 {
3818 print FILE " for_inetusers";
3819 }
3820 if (($proxysettings{'AUTH_METHOD'} eq 'radius') && ($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on'))
3821 {
3822 if ($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on')
3823 {
3824 if (($proxysettings{'RADIUS_USER_ACL'} eq 'positive') && (!-z "$raddir/radauth.allowusers"))
3825 {
3826 print FILE " for_acl_users";
3827 }
3828 if (($proxysettings{'RADIUS_USER_ACL'} eq 'negative') && (!-z "$raddir/radauth.denyusers"))
3829 {
3830 print FILE " !for_acl_users";
3831 }
3832 } else { print FILE " for_inetusers"; }
3833 }
3834 }
3835 print FILE "\n";
3836 }
3837
3838 if (!-z $acl_src_unrestricted_mac)
3839 {
3840 print FILE "http_access allow IPFire_unrestricted_mac";
3841 if ($proxysettings{'AUTH_ALWAYS_REQUIRED'} eq 'on')
3842 {
3843 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
3844 {
3845 if (!-z $disgrp) { print FILE " !for_disabled_users"; } else { print FILE " for_inetusers"; }
3846 }
3847 if (($proxysettings{'AUTH_METHOD'} eq 'ldap') || ($proxysettings{'AUTH_METHOD'} eq 'radius'))
3848 {
3849 print FILE " for_inetusers";
3850 }
3851 if (($proxysettings{'AUTH_METHOD'} eq 'radius') && ($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on'))
3852 {
3853 if ($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on')
3854 {
3855 if (($proxysettings{'RADIUS_USER_ACL'} eq 'positive') && (!-z "$raddir/radauth.allowusers"))
3856 {
3857 print FILE " for_acl_users";
3858 }
3859 if (($proxysettings{'RADIUS_USER_ACL'} eq 'negative') && (!-z "$raddir/radauth.denyusers"))
3860 {
3861 print FILE " !for_acl_users";
3862 }
3863 } else { print FILE " for_inetusers"; }
3864 }
3865 }
3866 print FILE "\n";
3867 }
3868
3869 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
3870 {
3871 if (!-z $disgrp) { print FILE "http_access deny for_disabled_users\n"; }
3872 if (!-z $extgrp) { print FILE "http_access allow IPFire_networks for_extended_users\n"; }
3873 }
3874
3875 if (
3876 (
3877 ($proxysettings{'AUTH_METHOD'} eq 'radius') &&
3878 ($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on') &&
3879 ($proxysettings{'RADIUS_USER_ACL'} eq 'negative') &&
3880 (!-z "$raddir/radauth.denyusers")
3881 )
3882 ||
3883 (
3884 ($proxysettings{'AUTH_METHOD'} eq 'ident') &&
3885 ($proxysettings{'AUTH_ALWAYS_REQUIRED'} eq 'off') &&
3886 ($proxysettings{'IDENT_ENABLE_ACL'} eq 'on') &&
3887 ($proxysettings{'IDENT_USER_ACL'} eq 'negative') &&
3888 (!-z "$identdir/identauth.denyusers")
3889 )
3890 )
3891 {
3892 print FILE "http_access deny for_acl_users";
3893 if (($proxysettings{'AUTH_METHOD'} eq 'ident') && (!-z "$identdir/hosts")) { print FILE " on_ident_aware_hosts"; }
3894 print FILE "\n";
3895 }
3896
3897 if (($proxysettings{'AUTH_METHOD'} eq 'ident') && ($proxysettings{'IDENT_REQUIRED'} eq 'on') && (!-z "$identhosts"))
3898 {
3899 print FILE "http_access allow";
3900 if ($proxysettings{'TIME_ACCESS_MODE'} eq 'deny') {
3901 print FILE " !within_timeframe";
3902 } else {
3903 print FILE " within_timeframe"; }
3904 print FILE " !on_ident_aware_hosts\n";
3905 }
3906
3907 print FILE "http_access allow IPFire_networks";
3908 if (
3909 (
3910 ($proxysettings{'AUTH_METHOD'} eq 'radius') &&
3911 ($proxysettings{'RADIUS_ENABLE_ACL'} eq 'on') &&
3912 ($proxysettings{'RADIUS_USER_ACL'} eq 'positive') &&
3913 (!-z "$raddir/radauth.allowusers")
3914 )
3915 ||
3916 (
3917 ($proxysettings{'AUTH_METHOD'} eq 'ident') &&
3918 ($proxysettings{'IDENT_REQUIRED'} eq 'on') &&
3919 ($proxysettings{'IDENT_ENABLE_ACL'} eq 'on') &&
3920 ($proxysettings{'IDENT_USER_ACL'} eq 'positive') &&
3921 (!-z "$identdir/identauth.allowusers")
3922 )
3923 )
3924 {
3925 print FILE " for_acl_users";
3926 } elsif (((!($proxysettings{'AUTH_METHOD'} eq 'none')) && (!($proxysettings{'AUTH_METHOD'} eq 'ident'))) ||
3927 (($proxysettings{'AUTH_METHOD'} eq 'ident') && ($proxysettings{'IDENT_REQUIRED'} eq 'on'))) {
3928 print FILE " for_inetusers";
3929 }
3930 if ((!($proxysettings{'AUTH_MAX_USERIP'} eq '')) && (!($proxysettings{'AUTH_METHOD'} eq 'none')) && (!($proxysettings{'AUTH_METHOD'} eq 'ident')))
3931 {
3932 print FILE " !concurrent";
3933 }
3934 if ($proxysettings{'TIME_ACCESS_MODE'} eq 'deny') {
3935 print FILE " !within_timeframe";
3936 } else {
3937 print FILE " within_timeframe"; }
3938 print FILE "\n";
3939
3940 print FILE "http_access deny all\n\n";
3941
3942 if (($proxysettings{'FORWARD_IPADDRESS'} eq 'off') || ($proxysettings{'FORWARD_VIA'} eq 'off'))
3943 {
3944 print FILE "#Strip HTTP Header\n";
3945
3946 if ($proxysettings{'FORWARD_IPADDRESS'} eq 'off')
3947 {
3948 print FILE "request_header_access X-Forwarded-For deny all\n";
3949 print FILE "reply_header_access X-Forwarded-For deny all\n";
3950 }
3951 if ($proxysettings{'FORWARD_VIA'} eq 'off')
3952 {
3953 print FILE "request_header_access Via deny all\n";
3954 print FILE "reply_header_access Via deny all\n";
3955 }
3956
3957 print FILE "\n";
3958
3959 }
3960
3961 if ((!-z $mimetypes) && ($proxysettings{'ENABLE_MIME_FILTER'} eq 'on')) {
3962 if (!-z $acl_src_unrestricted_ip) { print FILE "http_reply_access allow IPFire_unrestricted_ips\n"; }
3963 if (!-z $acl_src_unrestricted_mac) { print FILE "http_reply_access allow IPFire_unrestricted_mac\n"; }
3964 if ($proxysettings{'AUTH_METHOD'} eq 'ncsa')
3965 {
3966 if (!-z $extgrp) { print FILE "http_reply_access allow for_extended_users\n"; }
3967 }
3968 print FILE "http_reply_access deny blocked_mimetypes\n";
3969 print FILE "http_reply_access allow all\n\n";
3970 }
3971
3972 print FILE "visible_hostname";
3973 if ($proxysettings{'VISIBLE_HOSTNAME'} eq '')
3974 {
3975 print FILE " $mainsettings{'HOSTNAME'}.$mainsettings{'DOMAINNAME'}\n\n";
3976 } else {
3977 print FILE " $proxysettings{'VISIBLE_HOSTNAME'}\n\n";
3978 }
3979
3980 if (!($proxysettings{'ADMIN_MAIL_ADDRESS'} eq '')) { print FILE "cache_mgr $proxysettings{'ADMIN_MAIL_ADDRESS'}\n"; }
3981 if (!($proxysettings{'ADMIN_PASSWORD'} eq '')) { print FILE "cachemgr_passwd $proxysettings{'ADMIN_PASSWORD'} all\n"; }
3982 print FILE "\n";
3983
3984 print FILE "max_filedescriptors $proxysettings{'FILEDESCRIPTORS'}\n\n";
3985
3986 # Write the parent proxy info, if needed.
3987 if ($remotehost ne '')
3988 {
3989 print FILE "cache_peer $remotehost parent $remoteport 3130 default no-query";
3990
3991 # Enter authentication for the parent cache. Option format is
3992 # login=user:password ($proxy1='YES')
3993 # login=PASS ($proxy1='PASS')
3994 # login=*:password ($proxysettings{'FORWARD_USERNAME'} eq 'on')
3995 if (($proxy1 eq 'YES') || ($proxy1 eq 'PASS'))
3996 {
3997 print FILE " login=$proxysettings{'UPSTREAM_USER'}";
3998 if ($proxy1 eq 'YES') { print FILE ":$proxysettings{'UPSTREAM_PASSWORD'}"; }
3999 }
4000 elsif ($proxysettings{'FORWARD_USERNAME'} eq 'on') { print FILE " login=*:password"; }
4001
4002 print FILE "\nalways_direct allow IPFire_ips\n";
4003 print FILE "never_direct allow all\n\n";
4004 }
4005 if (($proxysettings{'ENABLE_FILTER'} eq 'on') || ($proxysettings{'ENABLE_UPDXLRATOR'} eq 'on') || ($proxysettings{'ENABLE_CLAMAV'} eq 'on'))
4006 {
4007 print FILE "url_rewrite_program /usr/sbin/redirect_wrapper\n";
4008 print FILE "url_rewrite_children ", &General::number_cpu_cores();
4009 print FILE " startup=", &General::number_cpu_cores();
4010 print FILE " idle=", &General::number_cpu_cores();
4011 print FILE " queue-size=", &General::number_cpu_cores() * 32, "\n\n";
4012 }
4013
4014 # Include file with user defined settings.
4015 if (-e "/etc/squid/squid.conf.local") {
4016 print FILE "include /etc/squid/squid.conf.local\n";
4017 }
4018 close FILE;
4019
4020 # Proxy settings for squidclamav - if installed.
4021 #
4022 # Check if squidclamav is enabled.
4023 if ($proxysettings{'ENABLE_CLAMAV'} eq 'on') {
4024
4025 my $configfile='/etc/squidclamav.conf';
4026
4027 my $data = &General::read_file_utf8($configfile);
4028 $data =~ s/squid_port [0-9]+/squid_port $proxysettings{'PROXY_PORT'}/g;
4029 &General::write_file_utf8($configfile, $data);
4030 }
4031 }
4032
4033 # -------------------------------------------------------------------
4034
4035 sub adduser
4036 {
4037 my ($str_user, $str_pass, $str_group) = @_;
4038 my @groupmembers=();
4039
4040 if ($str_pass eq 'lEaVeAlOnE')
4041 {
4042 open(FILE, "$userdb");
4043 @groupmembers = <FILE>;
4044 close(FILE);
4045 foreach $line (@groupmembers) { if ($line =~ /^$str_user:/i) { $str_pass = substr($line,index($line,":")); } }
4046 &deluser($str_user);
4047 open(FILE, ">>$userdb");
4048 flock FILE,2;
4049 print FILE "$str_user$str_pass";
4050 close(FILE);
4051 } else {
4052 &deluser($str_user);
4053
4054 my %htpasswd_options = (
4055 passwdFile => "$userdb",
4056 UseMD5 => 1,
4057 );
4058
4059 my $htpasswd = new Apache::Htpasswd(\%htpasswd_options);
4060
4061 $htpasswd->htpasswd($str_user, $str_pass);
4062 }
4063
4064 if ($str_group eq 'standard') { open(FILE, ">>$stdgrp");
4065 } elsif ($str_group eq 'extended') { open(FILE, ">>$extgrp");
4066 } elsif ($str_group eq 'disabled') { open(FILE, ">>$disgrp"); }
4067 flock FILE, 2;
4068 print FILE "$str_user\n";
4069 close(FILE);
4070
4071 return;
4072 }
4073
4074 # -------------------------------------------------------------------
4075
4076 sub deluser
4077 {
4078 my ($str_user) = @_;
4079 my $groupfile='';
4080 my @groupmembers=();
4081 my @templist=();
4082
4083 foreach $groupfile ($stdgrp, $extgrp, $disgrp)
4084 {
4085 undef @templist;
4086 open(FILE, "$groupfile");
4087 @groupmembers = <FILE>;
4088 close(FILE);
4089 foreach $line (@groupmembers) { if (!($line =~ /^$str_user$/i)) { push(@templist, $line); } }
4090 open(FILE, ">$groupfile");
4091 flock FILE, 2;
4092 print FILE @templist;
4093 close(FILE);
4094 }
4095
4096 undef @templist;
4097 open(FILE, "$userdb");
4098 @groupmembers = <FILE>;
4099 close(FILE);
4100 foreach $line (@groupmembers) { if (!($line =~ /^$str_user:/i)) { push(@templist, $line); } }
4101 open(FILE, ">$userdb");
4102 flock FILE, 2;
4103 print FILE @templist;
4104 close(FILE);
4105
4106 return;
4107 }
4108
4109 # -------------------------------------------------------------------
4110
4111 sub writecachemgr
4112 {
4113 open(FILE, ">${General::swroot}/proxy/cachemgr.conf");
4114 flock(FILE, 2);
4115 if (&Header::green_used()) {
4116 print FILE "$netsettings{'GREEN_ADDRESS'}:$proxysettings{'PROXY_PORT'}\n";
4117 }
4118 print FILE "localhost";
4119 close(FILE);
4120 return;
4121 }
4122
4123 # -------------------------------------------------------------------