X-Git-Url: http://git.ipfire.org/?p=people%2Fpmueller%2Fipfire-2.x.git;a=blobdiff_plain;f=html%2Fcgi-bin%2Fids.cgi;h=9ad5ae46ebcab57a10c82098495c23c4c752b60f;hp=8b74167ac9debb231532658552c42cd09d5af3a7;hb=5a3e0dca58c1efebdd0c4f8d8c3e9c3146d35f3e;hpb=822c5bd04ccc2641f876bb13b7bafcd967570a26 diff --git a/html/cgi-bin/ids.cgi b/html/cgi-bin/ids.cgi index 8b74167ac9..9ad5ae46eb 100644 --- a/html/cgi-bin/ids.cgi +++ b/html/cgi-bin/ids.cgi @@ -6,8 +6,6 @@ # # (c) The SmoothWall Team # -# $Id: ids.cgi,v 1.8.2.18 2005/07/27 21:35:22 franck78 Exp $ -# use LWP::UserAgent; use File::Copy; @@ -24,6 +22,7 @@ require "${General::swroot}/header.pl"; my %snortsettings=(); my %checked=(); +my %selected=(); my %netsettings=(); our $errormessage = ''; our $md5 = '0';# not '' to avoid displaying the wrong message when INSTALLMD5 not set @@ -40,17 +39,21 @@ $snortsettings{'ENABLE_SNORT_GREEN'} = 'off'; $snortsettings{'ENABLE_SNORT_BLUE'} = 'off'; $snortsettings{'ENABLE_SNORT_ORANGE'} = 'off'; $snortsettings{'ACTION'} = ''; -$snortsettings{'RULESTYPE'} = ''; +$snortsettings{'RULES'} = ''; $snortsettings{'OINKCODE'} = ''; $snortsettings{'INSTALLDATE'} = ''; $snortsettings{'INSTALLMD5'} = ''; &Header::getcgihash(\%snortsettings, {'wantfile' => 1, 'filevar' => 'FH'}); -if ($snortsettings{'RULESTYPE'} eq 'subscripted') { - $url="http://www.snort.org/pub-bin/oinkmaster.cgi/$snortsettings{'OINKCODE'}/snortrules-snapshot-2.3_s.tar.gz"; +if ($snortsettings{'RULES'} eq 'subscripted') { + $url="http://www.snort.org/pub-bin/oinkmaster.cgi/$snortsettings{'OINKCODE'}/snortrules-snapshot-CURRENT_s.tar.gz"; +} elsif ($snortsettings{'RULES'} eq 'registered') { + $url="http://www.snort.org/pub-bin/oinkmaster.cgi/$snortsettings{'OINKCODE'}/snortrules-snapshot-CURRENT.tar.gz"; +} elsif ($snortsettings{'RULES'} eq 'bleeding') { + $url="http://www.bleedingsnort.com/bleeding.rules.tar.gz"; } else { - $url="http://www.snort.org/pub-bin/oinkmaster.cgi/$snortsettings{'OINKCODE'}/snortrules-snapshot-2.3.tar.gz"; + $url="http://www.snort.org/pub-bin/downloads.cgi/Download/comm_rules/Community-Rules-CURRENT.tar.gz"; } if ($snortsettings{'ACTION'} eq $Lang::tr{'save'}) @@ -105,7 +108,7 @@ if ($snortsettings{'ACTION'} eq $Lang::tr{'download new ruleset'}) { $errormessage = "$Lang::tr{'invalid md5sum'}"; } else { $results = "$Lang::tr{'installed updates'}\n
";
-				$results .=`/usr/local/bin/oinkmaster.pl -s -u file://$filename -C /var/ipfire/snort/oinkmaster.conf -o /etc/snort 2>&1`;
+				$results .=`/usr/local/bin/oinkmaster.pl -s -u file://$filename -C /var/ipfire/snort/oinkmaster.conf -o /etc/snort/rules/ 2>&1`;
 				$results .= "
"; } unlink ($filename); @@ -125,10 +128,12 @@ $checked{'ENABLE_SNORT_BLUE'}{$snortsettings{'ENABLE_SNORT_BLUE'}} = "checked='c $checked{'ENABLE_SNORT_ORANGE'}{'off'} = ''; $checked{'ENABLE_SNORT_ORANGE'}{'on'} = ''; $checked{'ENABLE_SNORT_ORANGE'}{$snortsettings{'ENABLE_SNORT_ORANGE'}} = "checked='checked'"; -$checked{'RULESTYPE'}{'nothing'} = ''; -$checked{'RULESTYPE'}{'registered'} = ''; -$checked{'RULESTYPE'}{'subscripted'} = ''; -$checked{'RULESTYPE'}{$snortsettings{'RULESTYPE'}} = "checked='checked'"; +$selected{'RULES'}{'nothing'} = ''; +$selected{'RULES'}{'bleeding'} = ''; +$selected{'RULES'}{'community'} = ''; +$selected{'RULES'}{'registered'} = ''; +$selected{'RULES'}{'subscripted'} = ''; +$selected{'RULES'}{$snortsettings{'RULES'}} = "selected='selected'"; &Header::openpage($Lang::tr{'intrusion detection system'}, 1, ''); @@ -180,16 +185,14 @@ print <$Lang::tr{'ids rules update'} - - $Lang::tr{'no'} - - - - $Lang::tr{'registered user rules'} - - - - $Lang::tr{'subscripted user rules'} + +
@@ -199,7 +202,7 @@ print < - Oink Code:  + Oinkcode: