#!/usr/bin/perl ############################################################################### # # # IPFire.org - A linux based firewall # # Copyright (C) 2007-2013 IPFire Team # # # # This program is free software: you can redistribute it and/or modify # # it under the terms of the GNU General Public License as published by # # the Free Software Foundation, either version 3 of the License, or # # (at your option) any later version. # # # # This program is distributed in the hope that it will be useful, # # but WITHOUT ANY WARRANTY; without even the implied warranty of # # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # # GNU General Public License for more details. # # # # You should have received a copy of the GNU General Public License # # along with this program. If not, see . # # # ############################################################################### use strict; # enable only the following on debugging purpose #use warnings; #use CGI::Carp 'fatalsToBrowser'; use File::Copy; require '/var/ipfire/general-functions.pl'; require "${General::swroot}/lang.pl"; require "${General::swroot}/header.pl"; sub refreshpage{&Header::openbox( 'Waiting', 1, "" );print "

$Lang::tr{'pagerefresh'}
";&Header::closebox();} $a = new CGI; my %color = (); my %mainsettings = (); &General::readhash("${General::swroot}/main/settings", \%mainsettings); &General::readhash("/srv/web/ipfire/html/themes/".$mainsettings{'THEME'}."/include/colors.txt", \%color); my %snortsettings=(); my %checked=(); my %selected=(); my %netsettings=(); our $errormessage = ''; our $results = ''; our $tempdir = ''; our $url=''; &General::readhash("${General::swroot}/ethernet/settings", \%netsettings); &Header::showhttpheaders(); $snortsettings{'ENABLE_SNORT'} = 'off'; $snortsettings{'ENABLE_SNORT_GREEN'} = 'off'; $snortsettings{'ENABLE_SNORT_BLUE'} = 'off'; $snortsettings{'ENABLE_SNORT_ORANGE'} = 'off'; $snortsettings{'ENABLE_GUARDIAN'} = 'off'; $snortsettings{'GUARDIAN_INTERFACE'} = `cat /var/ipfire/red/iface`; $snortsettings{'GUARDIAN_HOSTGATEWAYBYTE'} = '1'; $snortsettings{'GUARDIAN_LOGFILE'} = '/var/log/guardian/guardian.log'; $snortsettings{'GUARDIAN_ALERTFILE'} = '/var/log/snort/alert'; $snortsettings{'GUARDIAN_IGNOREFILE'} = '/var/ipfire/guardian/guardian.ignore'; $snortsettings{'GUARDIAN_TARGETFILE'} = '/var/ipfire/guardian/guardian.target'; $snortsettings{'GUARDIAN_TIMELIMIT'} = '86400'; $snortsettings{'ACTION'} = ''; $snortsettings{'ACTION2'} = ''; $snortsettings{'RULES'} = ''; $snortsettings{'OINKCODE'} = ''; $snortsettings{'INSTALLDATE'} = ''; $snortsettings{'FILE'} = ''; $snortsettings{'UPLOAD'} = ''; &Header::getcgihash(\%snortsettings, {'wantfile' => 1, 'filevar' => 'FH'}); ####################### Added for snort rules control ################################# my $snortrulepath; # change to "/etc/snort/rules" - maniac my @snortconfig; my $restartsnortrequired = 0; my %snortrules; my $rule = ''; my $table1colour = ''; my $table2colour = ''; my $var = ''; my $value = ''; my $tmp = ''; my $linkedrulefile = ''; my $border = ''; my $checkboxname = ''; if (-e "/etc/snort/snort.conf") { # Open snort.conf file, read it in, close it, and re-open for writing open(FILE, "/etc/snort/snort.conf") or die 'Unable to read snort config file.'; @snortconfig = ; close(FILE); open(FILE, ">/etc/snort/snort.conf") or die 'Unable to write snort config file.'; my @rules = `cd /etc/snort/rules/ && ls *.rules 2>/dev/null`; # With this loop the rule might be display with correct rulepath set foreach (@rules) { chomp $_; my $temp = join(";",@snortconfig); if ( $temp =~ /$_/ ){next;} else { push(@snortconfig,"#include \$RULE_PATH/".$_);} } # Loop over each line foreach my $line (@snortconfig) { # Trim the line chomp $line; # Check for a line with .rules if ($line =~ /\.rules$/) { # Parse out rule file name $rule = $line; $rule =~ s/\$RULE_PATH\///i; $rule =~ s/ ?include ?//i; $rule =~ s/\#//i; my $snortrulepathrule = "$snortrulepath/$rule"; # Open rule file and read in contents open(RULEFILE, "$snortrulepath/$rule") or die "Unable to read snort rule file for reading => $snortrulepath/$rule."; my @snortrulefile = ; close(RULEFILE); open(RULEFILE, ">$snortrulepath/$rule") or die "Unable to write snort rule file for writing $snortrulepath/$rule"; # Local vars my $dashlinecnt = 0; my $desclook = 1; my $snortruledesc = ''; my %snortruledef = (); my $rulecnt = 1; # Loop over rule file contents foreach my $ruleline (@snortrulefile) { chomp $ruleline; # If still looking for a description if ($desclook) { # If line does not start with a # anymore, then done looking for a description if ($ruleline !~ /^\#/) { $desclook = 0; } # If see more than one dashed line, (start to) create rule file description if ($dashlinecnt > 1) { # Check for a line starting with a # if ($ruleline =~ /^\#/ and $ruleline !~ /^\#alert/) { # Create tempruleline my $tempruleline = $ruleline; # Strip off # and clean up line $tempruleline =~ s/\# ?//i; # Check for part of a description if ($snortruledesc eq '') { $snortruledesc = $tempruleline; } else { $snortruledesc .= " $tempruleline"; } } else { # Must be done $desclook = 0; } } # If have a dashed line, increment count if ($ruleline =~ /\# ?\-+/) { $dashlinecnt++; } } else { # Parse out rule file rule's message for display if ($ruleline =~ /(msg\:\"[^\"]+\";)/) { my $msg = ''; $msg = $1; $msg =~ s/msg\:\"//i; $msg =~ s/\";//i; $snortruledef{$rulecnt}{'Description'} = $msg; # Check for 'Save' and rule file displayed in query string if (($snortsettings{'ACTION'} eq $Lang::tr{'update'}) && ($ENV{'QUERY_STRING'} =~ /$rule/i)) { # Check for a disable rule which is now enabled, or an enabled rule which is now disabled if ((($ruleline =~ /^\#/) && (exists $snortsettings{"SNORT_RULE_$rule\_$rulecnt"})) || (($ruleline !~ /^\#/) && (!exists $snortsettings{"SNORT_RULE_$rule\_$rulecnt"}))) { $restartsnortrequired = 1; } # Strip out leading # from rule line $ruleline =~ s/\# ?//i; # Check if it does not exists (which means it is disabled), append a # if (!exists $snortsettings{"SNORT_RULE_$rule\_$rulecnt"}) { $ruleline = "#"." $ruleline"; } } # Check if ruleline does not begin with a #, so it is enabled if ($ruleline !~ /^\#/) { $snortruledef{$rulecnt++}{'State'} = 'Enabled'; } else { # Otherwise it is disabled $snortruledef{$rulecnt++}{'State'} = 'Disabled'; } } } # Print ruleline to RULEFILE print RULEFILE "$ruleline\n"; } # Close RULEFILE close(RULEFILE); # Check for 'Save' if ($snortsettings{'ACTION'} eq $Lang::tr{'update'}) { # Check for a disable rule which is now enabled, or an enabled rule which is now disabled if ((($line =~ /^\#/) && (exists $snortsettings{"SNORT_RULE_$rule"})) || (($line !~ /^\#/) && (!exists $snortsettings{"SNORT_RULE_$rule"}))) { $restartsnortrequired = 1; } # Strip out leading # from rule line $line =~ s/\# ?//i; # Check if it does not exists (which means it is disabled), append a # if (!exists $snortsettings{"SNORT_RULE_$rule"}) { $line = "# $line"; } } # Check for rule state if ($line =~ /^\#/) { $snortrules{$rule}{"State"} = "Disabled"; } else { $snortrules{$rule}{"State"} = "Enabled"; } # Set rule description $snortrules{$rule}{"Description"} = $snortruledesc; # Loop over sorted rules foreach my $ruledef (sort {$a <=> $b} keys(%snortruledef)) { $snortrules{$rule}{"Definition"}{$ruledef}{'Description'} = $snortruledef{$ruledef}{'Description'}; $snortrules{$rule}{"Definition"}{$ruledef}{'State'} = $snortruledef{$ruledef}{'State'}; } $snortruledesc = ''; print FILE "$line\n"; } elsif ($line =~ /var RULE_PATH/) { ($tmp, $tmp, $snortrulepath) = split(' ', $line); print FILE "$line\n"; } else { print FILE "$line\n"; } } close(FILE); if ($restartsnortrequired) { system('/usr/local/bin/snortctrl restart >/dev/null'); } } ####################### End added for snort rules control ################################# if ($snortsettings{'RULES'} eq 'subscripted') { $url=" http://www.snort.org/sub-rules/snortrules-snapshot-2953.tar.gz/$snortsettings{'OINKCODE'}"; } elsif ($snortsettings{'RULES'} eq 'registered') { $url=" http://www.snort.org/reg-rules/snortrules-snapshot-2950.tar.gz/$snortsettings{'OINKCODE'}"; } elsif ($snortsettings{'RULES'} eq 'community') { $url=" http://s3.amazonaws.com/snort-org/www/rules/community/community-rules.tar.gz"; } else { $url="http://rules.emergingthreats.net/open/snort-2.9.0/emerging.rules.tar.gz"; } if ($snortsettings{'ACTION'} eq $Lang::tr{'save'} && $snortsettings{'ACTION2'} eq "snort" ) { $errormessage = $Lang::tr{'invalid input for oink code'} unless ( ($snortsettings{'OINKCODE'} =~ /^[a-z0-9]+$/) || ($snortsettings{'RULES'} eq 'nothing' ) || ($snortsettings{'RULES'} eq 'emerging' ) || ($snortsettings{'RULES'} eq 'community' )); &General::writehash("${General::swroot}/snort/settings", \%snortsettings); if ($snortsettings{'ENABLE_SNORT'} eq 'on') { system ('/usr/bin/touch', "${General::swroot}/snort/enable"); } else { unlink "${General::swroot}/snort/enable"; } if ($snortsettings{'ENABLE_SNORT_GREEN'} eq 'on') { system ('/usr/bin/touch', "${General::swroot}/snort/enable_green"); } else { unlink "${General::swroot}/snort/enable_green"; } if ($snortsettings{'ENABLE_SNORT_BLUE'} eq 'on') { system ('/usr/bin/touch', "${General::swroot}/snort/enable_blue"); } else { unlink "${General::swroot}/snort/enable_blue"; } if ($snortsettings{'ENABLE_SNORT_ORANGE'} eq 'on') { system ('/usr/bin/touch', "${General::swroot}/snort/enable_orange"); } else { unlink "${General::swroot}/snort/enable_orange"; } if ($snortsettings{'ENABLE_PREPROCESSOR_HTTP_INSPECT'} eq 'on') { system ('/usr/bin/touch', "${General::swroot}/snort/enable_preprocessor_http_inspect"); } else { unlink "${General::swroot}/snort/enable_preprocessor_http_inspect"; } if ($snortsettings{'ENABLE_GUARDIAN'} eq 'on') { system ('/usr/bin/touch', "${General::swroot}/guardian/enable"); } else { unlink "${General::swroot}/guardian/enable"; } system('/usr/local/bin/snortctrl restart >/dev/null'); } elsif ($snortsettings{'ACTION'} eq $Lang::tr{'save'} && $snortsettings{'ACTION2'} eq "guardian" ){ foreach my $key (keys %snortsettings){ if ( $key !~ /^GUARDIAN/ ){ delete $snortsettings{$key}; } } &General::writehashpart("${General::swroot}/snort/settings", \%snortsettings); open(IGNOREFILE, ">$snortsettings{'GUARDIAN_IGNOREFILE'}") or die "Unable to write guardian ignore file $snortsettings{'GUARDIAN_IGNOREFILE'}"; print IGNOREFILE $snortsettings{'GUARDIAN_IGNOREFILE_CONTENT'}; close(IGNOREFILE); open(GUARDIAN, ">/var/ipfire/guardian/guardian.conf") or die "Unable to write guardian conf /var/ipfire/guardian/guardian.conf"; print GUARDIAN </dev/null'); } # INSTALLMD5 is not in the form, so not retrieved by getcgihash &General::readhash("${General::swroot}/snort/settings", \%snortsettings); if ($snortsettings{'ACTION'} eq $Lang::tr{'download new ruleset'} || $snortsettings{'ACTION'} eq $Lang::tr{'upload new ruleset'}) { my @df = `/bin/df -B M /var`; foreach my $line (@df) { next if $line =~ m/^Filesystem/; my $return; if ($line =~ m/dev/ ) { $line =~ m/^.* (\d+)M.*$/; my @temp = split(/ +/,$line); if ($1<300) { $errormessage = "$Lang::tr{'not enough disk space'} < 300MB, /var $1MB"; } else { if ( $snortsettings{'ACTION'} eq $Lang::tr{'download new ruleset'} ){ &downloadrulesfile(); sleep(3); $return = `cat /var/tmp/log 2>/dev/null`; } elsif ( $snortsettings{'ACTION'} eq $Lang::tr{'upload new ruleset'} ) { my $upload = $a->param("UPLOAD"); open UPLOADFILE, ">/var/tmp/snortrules.tar.gz"; binmode $upload; while ( <$upload> ) { print UPLOADFILE; } close UPLOADFILE; } if ($return =~ "ERROR"){ $errormessage = "
".$return."
"; } else { system("/usr/local/bin/oinkmaster.pl -v -s -u file:///var/tmp/snortrules.tar.gz -C /var/ipfire/snort/oinkmaster.conf -o /etc/snort/rules >>/var/tmp/log 2>&1 &"); sleep(2); } } } } } $checked{'ENABLE_SNORT'}{'off'} = ''; $checked{'ENABLE_SNORT'}{'on'} = ''; $checked{'ENABLE_SNORT'}{$snortsettings{'ENABLE_SNORT'}} = "checked='checked'"; $checked{'ENABLE_SNORT_GREEN'}{'off'} = ''; $checked{'ENABLE_SNORT_GREEN'}{'on'} = ''; $checked{'ENABLE_SNORT_GREEN'}{$snortsettings{'ENABLE_SNORT_GREEN'}} = "checked='checked'"; $checked{'ENABLE_SNORT_BLUE'}{'off'} = ''; $checked{'ENABLE_SNORT_BLUE'}{'on'} = ''; $checked{'ENABLE_SNORT_BLUE'}{$snortsettings{'ENABLE_SNORT_BLUE'}} = "checked='checked'"; $checked{'ENABLE_SNORT_ORANGE'}{'off'} = ''; $checked{'ENABLE_SNORT_ORANGE'}{'on'} = ''; $checked{'ENABLE_SNORT_ORANGE'}{$snortsettings{'ENABLE_SNORT_ORANGE'}} = "checked='checked'"; $checked{'ENABLE_GUARDIAN'}{'off'} = ''; $checked{'ENABLE_GUARDIAN'}{'on'} = ''; $checked{'ENABLE_GUARDIAN'}{$snortsettings{'ENABLE_GUARDIAN'}} = "checked='checked'"; $selected{'RULES'}{'nothing'} = ''; $selected{'RULES'}{'community'} = ''; $selected{'RULES'}{'emerging'} = ''; $selected{'RULES'}{'registered'} = ''; $selected{'RULES'}{'subscripted'} = ''; $selected{'RULES'}{$snortsettings{'RULES'}} = "selected='selected'"; &Header::openpage($Lang::tr{'intrusion detection system'}, 1, ''); ####################### Added for snort rules control ################################# print ""; print < END ; ####################### End added for snort rules control ################################# &Header::openbigbox('100%', 'left', '', $errormessage); ############### # DEBUG DEBUG # &Header::openbox('100%', 'left', 'DEBUG'); # my $debugCount = 0; # foreach my $line (sort keys %snortsettings) { # print "$line = $snortsettings{$line}
\n"; # $debugCount++; # } # print " Count: $debugCount\n"; # &Header::closebox(); # DEBUG DEBUG ############### if ($errormessage) { &Header::openbox('100%', 'left', $Lang::tr{'error messages'}); print "$errormessage\n"; print " \n"; &Header::closebox(); } my $return = `pidof oinkmaster.pl -x`; chomp($return); if ($return) { &Header::openbox( 'Waiting', 1, "" ); print < $Lang::tr{  $Lang::tr{'snort working'}
END
	my @output = `tail -20 /var/tmp/log`;
	foreach (@output) {
		print "$_";
	}
	print <
		
END
	&Header::closebox();
	&Header::closebigbox();
	&Header::closepage();
	exit;
	refreshpage();
}

&Header::openbox('100%', 'left', $Lang::tr{'intrusion detection system'});
print <";

print <
GREEN Snort END ; if ($netsettings{'BLUE_DEV'} ne '') { print "       BLUE Snort"; } if ($netsettings{'ORANGE_DEV'} ne '') { print "       ORANGE Snort"; } print "       RED Snort"; if ( -e "/var/ipfire/guardian/guardian.conf" ) { print "       Guardian"; } print <


$Lang::tr{'ids rules update'}

$Lang::tr{'ids rules license'} www.snort.org$Lang::tr{'ids rules license1'}

$Lang::tr{'ids rules license2'} Get an Oinkcode, $Lang::tr{'ids rules license3'}
Oinkcode: 

END ; if ( -e "/var/tmp/snortrules.tar.gz"){ my @Info = stat("/var/tmp/snortrules.tar.gz"); $snortsettings{'INSTALLDATE'} = localtime($Info[9]); } print " $Lang::tr{'updates installed'}: $snortsettings{'INSTALLDATE'}


END ; if ($results ne '') { print "$results"; } &Header::closebox(); ####################### Added for guardian control #################################### if ( -e "/var/ipfire/guardian/guardian.conf" ) { &Header::openbox('100%', 'LEFT', $Lang::tr{'guardian configuration'}); print <
$Lang::tr{'guardian interface'}
$Lang::tr{'guardian timelimit'}
$Lang::tr{'guardian logfile'}
$Lang::tr{'guardian alertfile'}
$Lang::tr{'guardian ignorefile'}
END ; &Header::closebox(); } ####################### Added for snort rules control ################################# if ( -e "${General::swroot}/snort/enable" || -e "${General::swroot}/snort/enable_green" || -e "${General::swroot}/snort/enable_blue" || -e "${General::swroot}/snort/enable_orange" ) { &Header::openbox('100%', 'LEFT', $Lang::tr{'intrusion detection system rules'}); # Output display table for rule files print "
"; print ""; # Local vars my $ruledisplaycnt = 1; my $rulecnt = keys %snortrules; $rulecnt++; $rulecnt = $rulecnt / 2; # Loop over each rule file foreach my $rulefile (sort keys(%snortrules)) { my $rulechecked = ''; # Hide inkompatible Block rules if ($rulefile =~'-BLOCK.rules') { next; } # Check if reached half-way through rule file rules to start new column if ($ruledisplaycnt > $rulecnt) { print "
"; $ruledisplaycnt = 0; } # Check if rule file is enabled if ($snortrules{$rulefile}{"State"} eq 'Enabled') { $rulechecked = 'CHECKED'; } # Create rule file link, vars array, and display flag my $rulefilelink = "?RULEFILE=$rulefile"; my $rulefiletoclose = ''; my @queryvars = (); my $displayrulefilerules = 0; # Check for passed in query string if ($ENV{'QUERY_STRING'}) { # Split out vars @queryvars = split(/\&/, $ENV{'QUERY_STRING'}); # Loop over values foreach $value (@queryvars) { # Split out var pairs ($var, $linkedrulefile) = split(/=/, $value); # Check if var is 'RULEFILE' if ($var eq 'RULEFILE') { # Check if rulefile equals linkedrulefile if ($rulefile eq $linkedrulefile) { # Set display flag $displayrulefilerules = 1; # Strip out rulefile from rulefilelink $rulefilelink =~ s/RULEFILE=$linkedrulefile//g; } else { # Add linked rule file to rulefilelink $rulefilelink .= "&RULEFILE=$linkedrulefile"; } } } } # Strip out extra & & ? from rulefilelink $rulefilelink =~ s/^\?\&/\?/i; # Check for a single '?' and replace with page for proper link display if ($rulefilelink eq '?') { $rulefilelink = "ids.cgi"; } # Output rule file name and checkbox print ""; print "
$rulefile
"; # Check for empty 'Description' if ($snortrules{$rulefile}{'Description'} eq '') { print ""; } else { # Output rule file 'Description' print "
No description available
"; } # Check for display flag if ($displayrulefilerules) { # Rule file definition rule display print ""; } # Close display table print "
$snortrules{$rulefile}{'Description'}
"; # Local vars my $ruledefdisplaycnt = 0; my $ruledefcnt = keys %{$snortrules{$rulefile}{"Definition"}}; $ruledefcnt++; $ruledefcnt = $ruledefcnt / 2; # Loop over rule file rules foreach my $ruledef (sort {$a <=> $b} keys(%{$snortrules{$rulefile}{"Definition"}})) { # Local vars my $ruledefchecked = ''; # If have display 2 rules, start new row if (($ruledefdisplaycnt % 2) == 0) { print ""; $ruledefdisplaycnt = 0; } # Check for rules state if ($snortrules{$rulefile}{'Definition'}{$ruledef}{'State'} eq 'Enabled') { $ruledefchecked = 'CHECKED'; } # Create rule file rule's checkbox $checkboxname = "SNORT_RULE_$rulefile"; $checkboxname .= "_$ruledef"; print ""; # Increment count $ruledefdisplaycnt++; } # If do not have second rule for row, create empty cell if (($ruledefdisplaycnt % 2) != 0) { print ""; } # Close display table print "
$snortrules{$rulefile}{'Definition'}{$ruledef}{'Description'}
"; # Increment ruledisplaycnt $ruledisplaycnt++; } print "
"; print <   END ; &Header::closebox(); } ####################### End added for snort rules control ################################# &Header::closebigbox(); &Header::closepage(); sub downloadrulesfile { my $peer; my $peerport; unlink("/var/tmp/log"); unless (-e "${General::swroot}/red/active") { $errormessage = $Lang::tr{'could not download latest updates'}; return undef; } my %proxysettings=(); &General::readhash("${General::swroot}/proxy/settings", \%proxysettings); if ($_=$proxysettings{'UPSTREAM_PROXY'}) { ($peer, $peerport) = (/^(?:[a-zA-Z ]+\:\/\/)?(?:[A-Za-z0-9\_\.\-]*?(?:\:[A-Za-z0-9\_\.\-]*?)?\@)?([a-zA-Z0-9\.\_\-]*?)(?:\:([0-9]{1,5}))?(?:\/.*?)?$/); } if ($peer) { system("wget -r --proxy=on --proxy-user=$proxysettings{'UPSTREAM_USER'} --proxy-passwd=$proxysettings{'UPSTREAM_PASSWORD'} -e http_proxy=http://$peer:$peerport/ -o /var/tmp/log --no-check-certificate --output-document=/var/tmp/snortrules.tar.gz $url"); } else { system("wget -r --no-check-certificate -o /var/tmp/log --output-document=/var/tmp/snortrules.tar.gz $url"); } }