"; - $results .=`/usr/local/bin/oinkmaster.pl -s -u file://$filename -C /var/ipfire/snort/oinkmaster.conf -o /etc/snort 2>&1`; - $results .= ""; + my $filename = &downloadrulesfile(); + if (defined $filename) { + $results = "$Lang::tr{'installed updates'}\n
"; + $results .=`/usr/local/bin/oinkmaster.pl -s -u file://$filename -C /var/ipfire/snort/oinkmaster.conf -o /etc/snort/rules 2>&1`; + $results .= ""; + } + unlink ($filename); } - unlink ($filename); + } } + + } $checked{'ENABLE_SNORT'}{'off'} = ''; @@ -125,15 +383,58 @@ $checked{'ENABLE_SNORT_BLUE'}{$snortsettings{'ENABLE_SNORT_BLUE'}} = "checked='c $checked{'ENABLE_SNORT_ORANGE'}{'off'} = ''; $checked{'ENABLE_SNORT_ORANGE'}{'on'} = ''; $checked{'ENABLE_SNORT_ORANGE'}{$snortsettings{'ENABLE_SNORT_ORANGE'}} = "checked='checked'"; -$checked{'RULESTYPE'}{'nothing'} = ''; -$checked{'RULESTYPE'}{'registered'} = ''; -$checked{'RULESTYPE'}{'subscripted'} = ''; -$checked{'RULESTYPE'}{$snortsettings{'RULESTYPE'}} = "checked='checked'"; +$checked{'ENABLE_GUARDIAN'}{'off'} = ''; +$checked{'ENABLE_GUARDIAN'}{'on'} = ''; +$checked{'ENABLE_GUARDIAN'}{$snortsettings{'ENABLE_GUARDIAN'}} = "checked='checked'"; +$selected{'RULES'}{'nothing'} = ''; +$selected{'RULES'}{'community'} = ''; +$selected{'RULES'}{'registered'} = ''; +$selected{'RULES'}{'subscripted'} = ''; +$selected{'RULES'}{$snortsettings{'RULES'}} = "selected='selected'"; &Header::openpage($Lang::tr{'intrusion detection system'}, 1, ''); +####################### Added for snort rules control ################################# +print ""; +print <
- GREEN Snort | -|
GREEN Snort
END
;
if ($netsettings{'BLUE_DEV'} ne '') {
-print <
- BLUE Snort |
- | - ORANGE Snort | - -END -; + print " ORANGE Snort"; } + print " RED Snort"; +if ( -e "/var/ipfire/guardian/guardian.conf" ) { + print " Guardian"; +} + print <- RED Snort | - +
- $Lang::tr{'no'} | -|
- $Lang::tr{'registered user rules'} | -|
- $Lang::tr{'subscripted user rules'} | ++ |
- $Lang::tr{'ids rules license'} http://www.snort.org. - - $Lang::tr{'ids rules license2'} USER PREFERENCES, $Lang::tr{'ids rules license3'} + $Lang::tr{'ids rules license'} www.snort.org$Lang::tr{'ids rules license1'} + $Lang::tr{'ids rules license2'} Get an Oinkcode, $Lang::tr{'ids rules license3'} |
|
Oink Code: | +Oinkcode: |
END ; -if ($snortsettings{'INSTALLMD5'} eq $md5) { - print " $Lang::tr{'rules already up to date'} | "; -} else { - if ( $snortsettings{'ACTION'} eq $Lang::tr{'download new ruleset'} && $md5 eq $realmd5 ) { - $snortsettings{'INSTALLMD5'} = $realmd5; - $snortsettings{'INSTALLDATE'} = `/bin/date +'%Y-%m-%d'`; - &General::writehash("${General::swroot}/snort/settings", \%snortsettings); - } - print " $Lang::tr{'updates installed'}: $snortsettings{'INSTALLDATE'}"; +if ( $snortsettings{'ACTION'} eq $Lang::tr{'download new ruleset'} ) { + $snortsettings{'INSTALLDATE'} = `/bin/date +'%Y-%m-%d'`; + &General::writehash("${General::swroot}/snort/settings", \%snortsettings); } +print " $Lang::tr{'updates installed'}: $snortsettings{'INSTALLDATE'}"; + print <
- | - | - - | +
$Lang::tr{'guardian interface'} | |
$Lang::tr{'guardian timelimit'} | |
$Lang::tr{'guardian logfile'} | |
$Lang::tr{'guardian alertfile'} | |
$Lang::tr{'guardian ignorefile'} | |
|
+
+ |
+
+ |
+ |