1. Detect for each IP the network it belongs and change background of that IP according to the network (Green, Red, Blue, Orange) 2. For each IP detect the country it belongs to and display country flag near IP This is my second attempt to use GIT. Signed-off-by: Horace Michael --- html/cgi-bin/guardian.cgi | 687 +++++++++++++++++++++++++++++++--------------- 1 file changed, 470 insertions(+), 217 deletions(-) mode change 100644 => 100755 html/cgi-bin/guardian.cgi diff --git a/html/cgi-bin/guardian.cgi b/html/cgi-bin/guardian.cgi old mode 100644 new mode 100755 index 963a56430768..b05d4f7f7bad --- a/html/cgi-bin/guardian.cgi +++ b/html/cgi-bin/guardian.cgi @@ -22,6 +22,9 @@ use strict; use Locale::Codes::Country; use Guardian::Socket; +use Net::IPv4Addr qw( :all ); +use Geo::IP::PurePerl; +use Switch; # enable only the following on debugging purpose #use warnings; @@ -45,6 +48,16 @@ my @memory=(); my @pid=(); my @guardian=(); +my @colour=(); +my @network=(); +my @masklen=(); +my $colour_multicast = "#A0A0A0"; +#needed for the country flag +my @key; +my @value; +my $color=0; + + # Path to the guardian.ignore file. my $ignorefile ='/var/ipfire/guardian/guardian.ignore'; @@ -56,6 +69,9 @@ my %module_file_locations = ( "SNORT" => "/var/log/snort/alert", "SSH" => "/var/log/messages", ); +my %netsettings=(); +&General::readhash("${General::swroot}/ethernet/settings", \%netsettings); + our %netsettings = (); &General::readhash("${General::swroot}/ethernet/settings", \%netsettings); @@ -65,6 +81,193 @@ our %mainsettings = (); &General::readhash("${General::swroot}/main/settings", \%mainsettings); &General::readhash("/srv/web/ipfire/html/themes/".$mainsettings{'THEME'}."/include/colors.txt", \%color); +# ##################################################### +# Collect data for the @network array. + +# Add Firewall Localhost 127.0.0.1 +push(@network, '127.0.0.1'); +push(@masklen, '255.255.255.255'); +push(@colour, ${Header::colourfw}); + + + +if (open(IP, "${General::swroot}/red/local-ipaddress")) { + my $redip = ; + close(IP); + chomp $redip; + push(@network, $redip); + push(@masklen, '255.255.255.255'); + push(@colour, ${Header::colourfw}); +} + +# Add STATIC RED aliases +if ($netsettings{'RED_DEV'}) { + my $aliasfile = "${General::swroot}/ethernet/aliases"; + open(ALIASES, $aliasfile) or die 'Unable to open aliases file.'; + my @aliases = ; + close(ALIASES); + +# We have a RED eth iface +if ($netsettings{'RED_TYPE'} eq 'STATIC') { + +#We have a STATIC RED eth iface + foreach my $line (@aliases) { + chomp($line); + my @temp = split(/\,/,$line); + if ($temp[0]) { + push(@network, $temp[0]); + push(@masklen, $netsettings{'RED_NETMASK'} ); + push(@colour, ${Header::colourfw} ); + } + } + } +} + +# Add Green Firewall Interface + push(@network, $netsettings{'GREEN_ADDRESS'}); + push(@masklen, "255.255.255.255" ); + push(@colour, ${Header::colourfw} ); + +# Add Green Network to Array + push(@network, $netsettings{'GREEN_NETADDRESS'}); + push(@masklen, $netsettings{'GREEN_NETMASK'} ); + push(@colour, ${Header::colourgreen} ); + +# Add Green Routes to Array + my @routes = `/sbin/route -n | /bin/grep $netsettings{'GREEN_DEV'}`; + foreach my $route (@routes) { + chomp($route); + my @temp = split(/[\t ]+/, $route); + push(@network, $temp[0]); + push(@masklen, $temp[2]); + push(@colour, ${Header::colourgreen} ); + } + +# Add Blue Firewall Interface + push(@network, $netsettings{'BLUE_ADDRESS'}); + push(@masklen, "255.255.255.255" ); + push(@colour, ${Header::colourfw} ); + +# Add Blue Network + if ($netsettings{'BLUE_DEV'}) { + push(@network, $netsettings{'BLUE_NETADDRESS'}); + push(@masklen, $netsettings{'BLUE_NETMASK'} ); + push(@colour, ${Header::colourblue} ); + +# Add Blue Routes to Array + @routes = `/sbin/route -n | /bin/grep $netsettings{'BLUE_DEV'}`; + foreach my $route (@routes) { + chomp($route); + my @temp = split(/[\t ]+/, $route); + push(@network, $temp[0]); + push(@masklen, $temp[2]); + push(@colour, ${Header::colourblue} ); + } +} + +# Add Orange Firewall Interface + push(@network, $netsettings{'ORANGE_ADDRESS'}); + push(@masklen, "255.255.255.255" ); + push(@colour, ${Header::colourfw} ); + +# Add Orange Network + if ($netsettings{'ORANGE_DEV'}) { + push(@network, $netsettings{'ORANGE_NETADDRESS'}); + push(@masklen, $netsettings{'ORANGE_NETMASK'} ); + push(@colour, ${Header::colourorange} ); + # Add Orange Routes to Array + @routes = `/sbin/route -n | /bin/grep $netsettings{'ORANGE_DEV'}`; + foreach my $route (@routes) { + chomp($route); + my @temp = split(/[\t ]+/, $route); + push(@network, $temp[0]); + push(@masklen, $temp[2]); + push(@colour, ${Header::colourorange} ); + + } +} + +# Highlight multicast connections. + push(@network, "224.0.0.0"); + push(@masklen, "239.0.0.0"); + push(@colour, $colour_multicast); + +# Add OpenVPN net and RED/BLUE/ORANGE entry (when appropriate) + if (-e "${General::swroot}/ovpn/settings") { + my %ovpnsettings = (); + &General::readhash("${General::swroot}/ovpn/settings", \%ovpnsettings); + my @tempovpnsubnet = split("\/",$ovpnsettings{'DOVPN_SUBNET'}); + +# add OpenVPN net + push(@network, $tempovpnsubnet[0]); + push(@masklen, $tempovpnsubnet[1]); + push(@colour, ${Header::colourovpn} ); + +# add BLUE:port / proto + if (($ovpnsettings{'ENABLED_BLUE'} eq 'on') && $netsettings{'BLUE_DEV'}) { + push(@network, $netsettings{'BLUE_ADDRESS'} ); + push(@masklen, '255.255.255.255' ); + push(@colour, ${Header::colourovpn}); +} + +# add ORANGE:port / proto + if (($ovpnsettings{'ENABLED_ORANGE'} eq 'on') && $netsettings{'ORANGE_DEV'}) { + push(@network, $netsettings{'ORANGE_ADDRESS'} ); + push(@masklen, '255.255.255.255' ); + push(@colour, ${Header::colourovpn} ); + } +} + +# Add OpenVPN net for custom OVPNs + if (-e "${General::swroot}/ovpn/ccd.conf") { + open(OVPNSUB, "${General::swroot}/ovpn/ccd.conf"); + my @ovpnsub = ; + close(OVPNSUB); + foreach (@ovpnsub) { + my ($network, $mask) = split '/', (split ',', $_)[2]; + $mask = ipv4_cidr2msk($mask) unless &General::validip($mask); + push(@network, $network); + push(@masklen, $mask); + push(@colour, ${Header::colourovpn}); + } +} + +open(IPSEC, "${General::swroot}/vpn/config"); + my @ipsec = ; + close(IPSEC); + foreach my $line (@ipsec) { + my @vpn = split(',', $line); + my ($network, $mask) = split("/", $vpn[12]); + if (!&General::validip($mask)) { + $mask = ipv4_cidr2msk($mask); + } + push(@network, $network); + push(@masklen, $mask); + push(@colour, ${Header::colourvpn}); +} + +if (-e "${General::swroot}/ovpn/n2nconf") { + open(OVPNN2N, "${General::swroot}/ovpn/ovpnconfig"); + my @ovpnn2n = ; + close(OVPNN2N); + foreach my $line (@ovpnn2n) { + my @ovpn = split(',', $line); + next if ($ovpn[4] ne 'net'); + my ($network, $mask) = split("/", $ovpn[12]); + if (!&General::validip($mask)) { + $mask = ipv4_cidr2msk($mask); + } + push(@network, $network); + push(@masklen, $mask); + push(@colour, ${Header::colourovpn}); + } +} + + +# ##################################################### + + + # Pakfire meta file for owncloud. # (File exists when the addon is installed.) my $owncloud_meta = "/opt/pakfire/db/installed/meta-owncloud"; @@ -475,8 +678,6 @@ sub showMainBox() { END - - # Draw current guardian state. &Header::openbox('100%', 'center', $Lang::tr{'guardian'}); @@ -563,14 +764,14 @@ END END - # Display owncloud checkbox when the addon is installed. - if ( -e "$owncloud_meta" ) { - print"\n"; - print"$Lang::tr{'guardian block owncloud brute-force'}\n"; - print"on /\n"; - print" off\n"; - print"\n"; - } + # Display owncloud checkbox when the addon is installed. + if ( -e "$owncloud_meta" ) { + print"\n"; + print"$Lang::tr{'guardian block owncloud brute-force'}\n"; + print"on /\n"; + print" off\n"; + print"\n"; + } print <
@@ -657,128 +858,140 @@ sub showIgnoreBox() { &Header::openbox('100%', 'center', $Lang::tr{'guardian ignored hosts'}); print < + + - + END - # Check if some hosts have been add to be ignored. - if (keys (%ignored)) { - my $col = ""; - - # Loop through all entries of the hash.. - while( (my $key) = each %ignored) { - # Assign data array positions to some nice variable names. - my $address = $ignored{$key}[0]; - my $remark = $ignored{$key}[1]; - my $status = $ignored{$key}[2]; - - # Check if the key (id) number is even or not. - if ($settings{'ID'} eq $key) { - $col="bgcolor='${Header::colouryellow}'"; - } elsif ($key % 2) { - $col="bgcolor='$color{'color22'}'"; - } else { - $col="bgcolor='$color{'color20'}'"; - } - - # Choose icon for the checkbox. - my $gif; - my $gdesc; - - # Check if the status is enabled and select the correct image and description. - if ($status eq 'enabled' ) { - $gif = 'on.gif'; - $gdesc = $Lang::tr{'click to disable'}; - } else { - $gif = 'off.gif'; - $gdesc = $Lang::tr{'click to enable'}; - } - - print < - - - - - - - - - -END - } - } else { - # Print notice that currently no hosts are ignored. - print "\n"; - print "\n"; - print "\n"; - } +# Check if some hosts have been add to be ignored. + if (keys (%ignored)) { + my $col = ""; + my $col1 = ""; - print "
$Lang::tr{'ip address'}$Lang::tr{'country'} $Lang::tr{'remark'}$Lang::tr{'action'}
$address$remark -
- - - -
-
-
- - - -
-
-
- - - -
-
$Lang::tr{'guardian no entries'}
\n"; +# Loop through all entries of the hash.. + while( (my $key) = each %ignored) { + # Assign data array positions to some nice variable names. + my $address = $ignored{$key}[0]; + my $remark = $ignored{$key}[1]; + my $status = $ignored{$key}[2]; - # Section to add new elements or edit existing ones. - print < -
-
+ # geoip lookup + my $gi = Geo::IP::PurePerl->new(); + my $ccode = $gi->country_code_by_name($address); + my $fcode = uc($ccode); -
- -END + # Detect the network in which the IP belongs and set the color for that network. + $col1=ipcolour($address); - # Assign correct headline and button text. - my $buttontext; - my $entry_address; - my $entry_remark; + # Check if the key (id) number is even or not. + if ($settings{'ID'} eq $key) { + $col="bgcolor='${Header::colouryellow}'"; + } elsif ($key % 2) { + $col="bgcolor='$color{'color22'}'"; + } else { + $col="bgcolor='$color{'color20'}'"; + } - # Check if an ID (key) has been given, in this case an existing entry should be edited. - if ($settings{'ID'} ne '') { - $buttontext = $Lang::tr{'update'}; - print "\n"; +# Choose icon for the checkbox. +my $gif; +my $gdesc; + +# Check if the status is enabled and select the correct image and description. +if ($status eq 'enabled' ) { + $gif = 'on.gif'; + $gdesc = $Lang::tr{'click to disable'}; +} else { + $gif = 'off.gif'; + $gdesc = $Lang::tr{'click to enable'}; +} - # Grab address and remark for the given key. - $entry_address = $ignored{$settings{'ID'}}[0]; - $entry_remark = $ignored{$settings{'ID'}}[1]; +print ""; + print ""; + if ( $fcode ne "" ){ + print ""; + } + else { + print ""; + } + print ""; +print < +
+ + + + + +
+ + +END + } } else { - $buttontext = $Lang::tr{'add'}; - print "\n"; + # Print notice that currently no hosts are ignored. + print "\n"; + print "\n"; + print "\n"; } - print < - - - - + print "
$Lang::tr{'update'}
$address$ccode$remark +
+ + + +
+
+
+ + + +
+
$Lang::tr{'dnsforward add a new entry'}
$Lang::tr{'guardian no entries'}
$Lang::tr{'ip address'}:
\n"; - $Lang::tr{'remark'}: - - - - - -
+# Section to add new elements or edit existing ones. +print < +
+
+ +
+ +END + +# Assign correct headline and button text. +my $buttontext; +my $entry_address; +my $entry_remark; + +# Check if an ID (key) has been given, in this case an existing entry should be edited. +if ($settings{'ID'} ne '') { + $buttontext = $Lang::tr{'update'}; + print "\n"; + + # Grab address and remark for the given key. + $entry_address = $ignored{$settings{'ID'}}[0]; + $entry_remark = $ignored{$settings{'ID'}}[1]; +} else { + $buttontext = $Lang::tr{'add'}; + print "\n"; +} + +print < + + + + + + + + + +
$Lang::tr{'update'}
$Lang::tr{'dnsforward add a new entry'}
$Lang::tr{'ip address'}: $Lang::tr{'remark'}:
+
END &Header::closebox(); @@ -788,73 +1001,91 @@ END sub showBlockedBox() { &Header::openbox('100%', 'center', $Lang::tr{'guardian blocked hosts'}); - print < - - $Lang::tr{'guardian blocked hosts'} - + # VirusTotal + # DomainTools + # MultiRBL + # IPVoid + +print < + + $Lang::tr{'guardian blocked hosts'} + $Lang::tr{'country'} + $Lang::tr{'action'} + END - # Lauch function to get the currently blocked hosts. - my @blocked_hosts = &GetBlockedHosts(); +# Launch function to get the currently blocked hosts. +my @blocked_hosts = &GetBlockedHosts(); - my $id = 0; - my $col = ""; +my $id = 0; +my $col = ""; +my $col1 = ""; - # Loop through our blocked hosts array. - foreach my $blocked_host (@blocked_hosts) { +# Loop through our blocked hosts array. +foreach my $blocked_host (@blocked_hosts) { + # geoip lookup + my $gi = Geo::IP::PurePerl->new(); + my $ccode = $gi->country_code_by_name($blocked_host); + my $fcode = uc($ccode); - # Increase id number for each element in the ignore file. - $id++; + # Detect the network in which the IP belongs and set the color for that network. + $col1=ipcolour($blocked_host); - # Check if the id number is even or not. - if ($id % 2) { - $col="bgcolor='$color{'color22'}'"; - } else { - $col="bgcolor='$color{'color20'}'"; - } + # Increase id number for each element in the ignore file. + $id++; - print < - $blocked_host - -
- - - -
- - + # Check if the id number is even or not. + if ($id % 2) { + $col="bgcolor='$color{'color22'}'"; + } else { + $col="bgcolor='$color{'color20'}'"; + } + print ""; + print " $blocked_host"; + if ( $fcode ne "" ){ + print "$ccode";} + else { + print "$fcode";} + print < +
+ + + +
+ + END - } + } - # If the loop only has been runs once the id still is "0", which means there are no - # additional entries (blocked hosts) in the iptables chain. - if ($id == 0) { +# If the loop only has been runs once the id still is "0", which means there are no +# additional entries (blocked hosts) in the iptables chain. +if ($id == 0) { - # Print notice that currently no hosts are blocked. - print "\n"; - print "$Lang::tr{'guardian no entries'}\n"; - print "\n"; - } + # Print notice that currently no hosts are blocked. + print "\n"; + print "$Lang::tr{'guardian no entries'}\n"; + print "\n"; +} print "\n"; # Section for a manual block of an IP-address. - print < -
- - - - - - - - - -
$Lang::tr{'guardian block a host'}:
-
+print < +
+ + + + + + + + + +
$Lang::tr{'guardian block a host'}:
+
END &Header::closebox(); @@ -887,58 +1118,58 @@ sub daemonstats() { } sub GetBlockedHosts() { - # Create new, empty array. - my @hosts; - - # Lauch helper to get chains from iptables. - system('/usr/local/bin/getipstat'); - - # Open temporary file which contains the chains and rules. - open (FILE, '/srv/web/ipfire/html/iptables.txt'); - - # Loop through the entire file. - while () { - my $line = $_; - - # Search for the guardian chain and extract - # the lines between it and the next empty line - # which is placed before the next firewall - # chain starts. - if ($line =~ /^Chain GUARDIAN/ .. /^\s*$/) { - # Skip descriptive lines. - next if ($line =~ /^Chain/); - next if ($line =~ /^ pkts/); - - # Generate array, based on the line content (seperator is a single or multiple space's) - my @comps = split(/\s{1,}/, $line); - my ($lead, $pkts, $bytes, $target, $prot, $opt, $in, $out, $source, $destination) = @comps; - - # Assign different variable names. - my $blocked_host = $source; - - # Add host to our hosts array. - if ($blocked_host) { - push(@hosts, $blocked_host); - } +# Create new, empty array. +my @hosts; + +# Lauch helper to get chains from iptables. +system('/usr/local/bin/getipstat'); + +# Open temporary file which contains the chains and rules. +open (FILE, '/srv/web/ipfire/html/iptables.txt'); + +# Loop through the entire file. +while () { + my $line = $_; + + # Search for the guardian chain and extract + # the lines between it and the next empty line + # which is placed before the next firewall + # chain starts. + if ($line =~ /^Chain GUARDIAN/ .. /^\s*$/) { + # Skip descriptive lines. + next if ($line =~ /^Chain/); + next if ($line =~ /^ pkts/); + + # Generate array, based on the line content (seperator is a single or multiple space's) + my @comps = split(/\s{1,}/, $line); + my ($lead, $pkts, $bytes, $target, $prot, $opt, $in, $out, $source, $destination) = @comps; + + # Assign different variable names. + my $blocked_host = $source; + + # Add host to our hosts array. + if ($blocked_host) { + push(@hosts, $blocked_host); } } +} - # Close filehandle. - close(FILE); +# Close filehandle. +close(FILE); - # Remove recently created temporary files of the "getipstat" binary. - system(rm -f "/srv/web/ipfire/html/iptables.txt"); - system(rm -f "/srv/web/ipfire/html/iptablesmangle.txt"); - system(rm -f "/srv/web/ipfire/html/iptablesnat.txt"); +# Remove recently created temporary files of the "getipstat" binary. +system(rm -f "/srv/web/ipfire/html/iptables.txt"); +system(rm -f "/srv/web/ipfire/html/iptablesmangle.txt"); +system(rm -f "/srv/web/ipfire/html/iptablesnat.txt"); - # Convert entries, sort them, write back and store the sorted entries into new array. - my @sorted = map { $_->[0] } - sort { $a->[1] <=> $b->[1] } - map { [$_, int sprintf("%03.f%03.f%03.f%03.f", split(/\./, $_))] } - @hosts; +# Convert entries, sort them, write back and store the sorted entries into new array. +my @sorted = map { $_->[0] } + sort { $a->[1] <=> $b->[1] } + map { [$_, int sprintf("%03.f%03.f%03.f%03.f", split(/\./, $_))] } + @hosts; - # Return our sorted list. - return @sorted +# Return our sorted list. +return @sorted } sub BuildConfiguration() { @@ -1100,7 +1331,7 @@ sub GenerateIgnoreFile() { print FILE "$address\n\n"; } } - } + } } close(FILE); @@ -1135,3 +1366,25 @@ sub _get_address_from_file ($) { # Return nothing. return; } + + +sub ipcolour($) { + my $id = 0; + my $colour = ${Header::colourred}; + my ($ip) = $_[0]; + my $found = 0; + + foreach my $line (@network) { + if ($network[$id] eq '') { + $id++; + } else { + if (!$found && ipv4_in_network($network[$id], $masklen[$id], $ip) ) { + $found = 1; + $colour = $colour[$id]; + } + $id++; + } + } + + return $colour; +} -- 2.7.4