From mboxrd@z Thu Jan 1 00:00:00 1970 From: Tim FitzGeorge To: development@lists.ipfire.org Subject: [PATCH 2/5] ipblacklist: WUI and language file Date: Mon, 25 Nov 2019 20:13:06 +0000 Message-ID: <20191125201309.10840-3-ipfr@tfitzgeorge.me.uk> In-Reply-To: <20191125201309.10840-1-ipfr@tfitzgeorge.me.uk> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============2852044091131062013==" List-Id: --===============2852044091131062013== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Main WUI page and update to system logs page Signed-off-by: Tim FitzGeorge --- config/menu/50-firewall.menu | 5 + html/cgi-bin/ipblacklist.cgi | 725 ++++++++++++++++++++++++++++++++++++++++= ++ html/cgi-bin/logs.cgi/log.dat | 2 + langs/en/cgi-bin/en.pl | 31 ++ 4 files changed, 763 insertions(+) create mode 100644 html/cgi-bin/ipblacklist.cgi diff --git a/config/menu/50-firewall.menu b/config/menu/50-firewall.menu index 5ec1f67fc..cd82bfaa3 100644 --- a/config/menu/50-firewall.menu +++ b/config/menu/50-firewall.menu @@ -21,6 +21,11 @@ 'title' =3D> "$Lang::tr{'intrusion detection= system'}", 'enabled' =3D> 1, }; + $subfirewall->{'45.ipblacklist'} =3D {'caption' =3D> $Lang::tr{'ipblackl= ist'}, + 'uri' =3D> '/cgi-bin/ipblacklist.cgi', + 'title' =3D> "$Lang::tr{'ipblacklist'}", + 'enabled' =3D> 1, + }; $subfirewall->{'50.p2p'} =3D { 'caption' =3D> $Lang::tr{'p2p block'}, 'uri' =3D> '/cgi-bin/p2p-block.cgi', diff --git a/html/cgi-bin/ipblacklist.cgi b/html/cgi-bin/ipblacklist.cgi new file mode 100644 index 000000000..b2ccf7b3f --- /dev/null +++ b/html/cgi-bin/ipblacklist.cgi @@ -0,0 +1,725 @@ +#!/usr/bin/perl + +############################################################################= ### +# = # +# IPFire.org - A linux based firewall = # +# = # +# This program is free software: you can redistribute it and/or modify = # +# it under the terms of the GNU General Public License as published by = # +# the Free Software Foundation, either version 3 of the License, or = # +# (at your option) any later version. = # +# = # +# This program is distributed in the hope that it will be useful, = # +# but WITHOUT ANY WARRANTY; without even the implied warranty of = # +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the = # +# GNU General Public License for more details. = # +# = # +# You should have received a copy of the GNU General Public License = # +# along with this program. If not, see . = # +# = # +# Copyright (C) 2018 - 2019 The IPFire Team = # +# = # +############################################################################= ### + +use strict; +use CGI qw/:standard/; +#enable only the following on debugging purpose +#use warnings; +#use CGI::Carp 'fatalsToBrowser'; +use Sort::Naturally; +use Socket; + +require '/var/ipfire/general-functions.pl'; +require "${General::swroot}/lang.pl"; +require "${General::swroot}/header.pl"; + +############################################################################= ### +# Initialize variables and hashes +############################################################################= ### + +my $settings =3D "${General::swroot}/ipblacklist/settings"; +my $modified =3D "${General::swroot}/ipblacklist/modified"; +my $sources =3D "${General::swroot}/ipblacklist/sources"; +my $getipstat =3D '/usr/local/bin/getipstat'; +my $getipsetstat =3D '/usr/local/bin/getipsetstat'; +my $control =3D '/usr/local/bin/ipblacklistctrl'; +my $lockfile =3D '/var/run/ipblacklist.pid'; +my $autoblacklist =3D 'AUTOBLACKLIST'; +my %cgiparams =3D ('ACTION' =3D> '', 'AUTOACTION' =3D> ''); +my $errormessage =3D ''; +my $updating =3D 0; +my %mainsettings; +my %color; +my %modified; +my %sources; +my %stats; +my %autoblock_addresses; + +my %settings =3D ( 'DEBUG' =3D> 0, + 'LOGGING' =3D> 'on', + 'RATE' =3D> 24, + 'ENABLE' =3D> 'off', + 'BLOCK_THRESHOLD' =3D> 10, + 'BLOCK_PERIOD' =3D> 3600, + $autoblacklist =3D> 'off' ); + +# Read all parameters for site +Header::getcgihash( \%cgiparams); +General::readhash( "${General::swroot}/main/settings", \%mainsettings ); +General::readhash( "/srv/web/ipfire/html/themes/".$mainsettings{'THEME'}."/i= nclude/colors.txt", \%color ); +General::readhash( $settings, \%settings ) if (-r $settings); +General::readhash( $modified, \%modified) if (-r $modified); +eval qx|/bin/cat $sources| if (-r $sources); + +# Show Headers + +Header::showhttpheaders(); + +# Process actions + +if ($cgiparams{'ACTION'} eq "$Lang::tr{'save'}") +{ + #Save Button on configsite + + my %new_settings =3D ( 'ENABLE' =3D> 'off', + 'RATE' =3D> 24, + 'LOGGING' =3D> 'off', + 'DEBUG' =3D> 0, + 'BLOCK_THRESHOLD' =3D> $settings{'BLOCK_THRESHOLD'} |= | 10, + 'BLOCK_PERIOD' =3D> $settings{'BLOCK_PERIOD'} || 3= 600, + $autoblacklist =3D> $settings{$autoblacklist} ); + + $errormessage .=3D "$Lang::tr{'ipblacklist invalid check rate'}
" if ((= $cgiparams{'RATE'} !~ m/^\d+$/) or + ($c= giparams{'RATE'} < 1) or + ($c= giparams{'RATE'} > 1000)); + + $new_settings{'RATE'} =3D $cgiparams{'RATE'}; + delete $cgiparams{'RATE'}; + + foreach my $item ('LOGGING', 'ENABLE', keys %sources) + { + $new_settings{$item} =3D (exists $cgiparams{$item}) ? 'on' : 'off'; + + $updating =3D 1 if (not exists $settings{$item} or $new_settings{$item} = ne $settings{$item}); + } + + # Check for redundant blacklists being enabled + + foreach my $list (keys %sources) + { + if (exists $settings{$list} and + $settings{$list} eq 'on' and + exists $sources{$list}{'override'} and + $settings{$sources{$list}{'override'}} eq 'on') + { + $settings{$sources{$list}{'override'}} =3D 'off'; + + $updating =3D 1; + $errormessage .=3D "$Lang::tr{'ipblacklist disable pre'} $sources{$lis= t}{'override'} " . + "$Lang::tr{'ipblacklist disable mid'} $list $Lang::tr= {'ipblacklist disable post'}
\n"; + } + } + + if ($settings{'LOGGING'} ne $new_settings{'LOGGING'}) + { + if ($new_settings{'LOGGING'} eq 'on') + { + system( "$control log-on" ); + } + else + { + system( "$control log-off" ); + } + } + + if ($settings{'ENABLE'} ne $new_settings{'ENABLE'}) + { + if ($new_settings{'ENABLE'} eq 'on') + { + system( "$control enable" ); + } + else + { + $settings{$autoblacklist} =3D 'off'; + system( "$control disable" ); + } + + $updating =3D 1; + } + + %settings =3D %new_settings; + + if ($errormessage) + { + $updating =3D 0; + } + else + { + General::writehash($settings, \%new_settings); + + if ($updating) + { + system( "$control update &" ); + get_ipset_stats(); + show_running(); + exit 0; + } + } +} +elsif ($cgiparams{'AUTOACTION'} eq "$Lang::tr{'save'}") +{ + $updating =3D 1 if ($settings{$autoblacklist} eq 'on' and not exists $cgip= arams{$autoblacklist}); + $updating =3D 1 if ($settings{$autoblacklist} eq 'off' and exists $cgipara= ms{$autoblacklist}); + + $settings{$autoblacklist} =3D (exists $cgiparams{$autoblacklist}) ? 'on= ' : 'off'; + $settings{'BLOCK_THRESHOLD'} =3D $cgiparams{'BLOCK_THRESHOLD'}; + $settings{'BLOCK_PERIOD'} =3D $cgiparams{'BLOCK_PERIOD'} ; + + if (($cgiparams{'BLOCK_THRESHOLD'} !~ m/^\d+$/) or + ($cgiparams{'BLOCK_THRESHOLD'} < 1) or + ($cgiparams{'BLOCK_THRESHOLD'} > 1000000)) + { + $errormessage .=3D "$Lang::tr{'ipblacklist invalid threshold'}: $cgipara= ms{'BLOCK_THRESHOLD'}
"; + } + + if (($cgiparams{'BLOCK_PERIOD'} !~ m/^\d+$/) or + ($cgiparams{'BLOCK_PERIOD'} < 1) or + ($cgiparams{'BLOCK_PERIOD'} > 86400)) + { + $errormessage .=3D "$Lang::tr{'ipblacklist invalid block time'}: $cgipar= ams{'BLOCK_PERIOD'}
"; + } + + if ($errormessage) + { + $updating =3D 0; + } + else + { + General::writehash($settings, \%settings); + system( "$control autoblacklist-update" ) if ($updating); + } +} +elsif ($cgiparams{'AUTOACTION'} eq "$Lang::tr{'unblock all'}") +{ + system( "$control autoblacklist-clear" ); +} + +get_ipset_stats(); + +if (is_running()) +{ + show_running(); + exit 0; +} + +# Get blacklist statistics + +get_iptables_stats(); + +# Show site + +Header::openpage($Lang::tr{'ipblacklist'}, 1, ''); +Header::openbigbox('100%', 'left'); +error(); + +showstatus() if ($settings{ENABLE} eq 'on'); + +configsite(); + +# End of page + +Header::closebigbox(); +Header::closepage(); + +exit 0; + + +#---------------------------------------------------------------------------= --- +# sub configsite() +# +# Displays configuration +#---------------------------------------------------------------------------= --- + +sub configsite +{ + # Find preselections + + my $enable =3D 'checked'; + Header::openbox('100%', 'left', $Lang::tr{'settings'}); + + #### JAVA SCRIPT #### + + print< + \$(document).ready(function() + { + // Show/Hide elements when ENABLE checkbox is checked. + if (\$("#ENABLE").attr("checked")) + { + \$(".sources").show(); + } + else + { + \$(".sources").hide(); + } + + // Toggle Source list elements when "ENABLE" checkbox is clicked + \$("#ENABLE").change(function() + { + \$(".sources").toggle(); + }); + }); + +END + + ##### JAVA SCRIPT END #### + + # Enable checkbox + + $enable =3D ($settings{'ENABLE'} eq 'on') ? ' checked' : ''; + + print< + + + + + +
$Lang::tr{'ipblacklist use ipblacklists'}

+ +END + + # The following are only displayed if the blacklists are enabled + + $enable =3D ($settings{'LOGGING'} eq 'on') ? ' checked' : ''; + + print < + + + + + + + +
$Lang::tr{'ipblacklist log'}$Lang::tr{'ipblacklist check rate'} + +
+

+

$Lang::tr{'ipblacklist blacklist settings'}

+ + + + + + + +END + + # Iterate through the list of sources + + my $lines =3D 0; + + foreach my $list (sort keys %sources) + { + my $name =3D escapeHTML( $sources{$list}{'name'} ); + my $safe =3D $Lang::tr{$sources{$list}{safe}}; + $enable =3D ''; + my $col =3D ($lines++ % 2) ? "bgcolor=3D'$color{'color20'}'" : "bgco= lor=3D'$color{'color22'}'"; + + $enable =3D ' checked' if (exists $settings{$list} and $settings{$list} = eq 'on'); + + print < + + + + \n +END + } + + # The save button at the bottom of the table + + print < +

$Lang::tr{'ipblacklist safe note'}

+ +
$Lang::tr{'ipblacklist id'}$Lang::tr{'ipblacklist name'}$Lang::tr{'ipblacklist safe'}$Lang::tr{'ipblacklist enable'}
+END + + if ($sources{$list}{info}) + { + print "$list\n= "; + } + else + { + print "$list\n"; + } + + print < + $name$safe
+ + + +
+
+
+END + + $enable =3D $settings{$autoblacklist} eq 'on' ? ' checked' : ''; + + print <
+

$Lang::tr{'ipblacklist auto list'}

+ + + + + + + + + + + + + + +
+ $Lang::tr{'ipblacklist autoblacklist enable'} + + + +   +
+ $Lang::tr{'ipblacklist autoblacklist threshold'} + + + +
+ $Lang::tr{'ipblacklist autoblacklist block time'} + + + +
+ + + + +
+ +
+END + + Header::closebox(); +} + + +#---------------------------------------------------------------------------= --- +# sub showstatus() +# +# Displays current blacklist status +#---------------------------------------------------------------------------= --- + +sub showstatus +{ + Header::openbox('100%', 'center', $Lang::tr{'status'}); + + print < + + $Lang::tr{'ipblacklist id'} + $Lang::tr{'ipblacklist entries'} + $Lang::tr{'ipblacklist pkts in'} + $Lang::tr{'ipblacklist bytes in'} + $Lang::tr{'ipblacklist pkts out'} + $Lang::tr{'ipblacklist bytes out'} + $Lang::tr{'ipblacklist updated'} + +END + + # Iterate through the list of sources + + foreach my $list ($autoblacklist, sort keys %sources) + { + next unless ($settings{$list} eq 'on'); + + my $size =3D ' '; + my $pkts_in =3D ' '; + my $bytes_in =3D ' '; + my $pkts_out =3D ' '; + my $bytes_out =3D ' '; + my $updated =3D ' '; + + if (exists $stats{$list}) + { + ($pkts_in, $bytes_in) =3D @{ $stats{$list}{IPBLACKLISTREDIN} } if (= exists $stats{$list}{IPBLACKLISTREDIN}); + ($pkts_out, $bytes_out) =3D @{ $stats{$list}{IPBLACKLISTREDOUT} } if (= exists $stats{$list}{IPBLACKLISTREDOUT}); + $size =3D $stats{$list}{size} if (= exists $stats{$list}{size}); + } + + if (exists $modified{$list} and $modified{$list} > 0) + { + $updated =3D localtime( $modified{$list} ); + } + + print < + $list + $size + $pkts_in + $bytes_in + $pkts_out + $bytes_out + $updated + \n +END + + } + + print < +END + + if ($settings{$autoblacklist} eq 'on') + { + print <
+

$Lang::tr{'ipblacklist auto list'}

+ + + + + +END + + foreach my $address (nsort keys %autoblock_addresses ) + { + print "\n"; + } + + print < +
$Lang::tr{'ip address'}$Lang::tr{'ipblacklist block time remaining'}
$address$autoblock_addresses{= $address}
+ + + + + +
+END + } + + Header::closebox(); +} + + +#---------------------------------------------------------------------------= --- +# sub get_ipset_stats() +# +# Gets the number of entries in each IPSet. +#---------------------------------------------------------------------------= --- + +sub get_ipset_stats +{ + my $name; + + system( $getipsetstat ); + + # Get the number of entries in each IP set + + if (-r '/var/tmp/ipsets.txt') + { + open STATS, '<', '/var/tmp/ipsets.txt' or die "Can't open IP Sets stats = file: $!"; + + foreach my $line () + { + if ($line =3D~ m/Name: (\w+)/) + { + $name =3D $1; + next; + } + + if ($line =3D~ m/Number of entries: (\d+)/) + { + $stats{$name}{'size'} =3D $1; + } + } + + close STATS; + + unlink( '/var/tmp/ipsets.txt' ); + } + + # Get the IP addresses in the autoblacklist + + if (-r '/var/tmp/autoblacklist.txt') + { + open HASHTABLE, '<', '/var/tmp/autoblacklist.txt' or die "Can't open aut= oblacklist address file: $!"; + + # Iterate through the blocked addresses + + foreach my $line () + { + next unless ($line =3D~ m/(\d+\.\d+\.\d+\.\d+) timeout (\d+)/); + + $autoblock_addresses{$1} =3D format_time( $2 ); + } + + close HASHTABLE; + + unlink( '/var/tmp/autoblacklist.txt' ); + } + +} + + +#---------------------------------------------------------------------------= --- +# sub get_iptables_stats() +# +# Gets information on the number of packets and bytes rejected by each +# blacklist +#---------------------------------------------------------------------------= --- + +sub get_iptables_stats +{ + system( $getipstat ); + unlink( '/var/tmp/iptablesmangle.txt' ); + unlink( '/var/tmp/iptablesnat.txt' ); + + return unless (-r '/var/tmp/iptables.txt'); + + open STATS, '<', '/var/tmp/iptables.txt' or die "Can't open IP Tables stat= s file: $!"; + + my $table =3D 'Unknown'; + + foreach my $line () + { + if ($line =3D~ m/^Chain (\w+)/) + { + $table =3D $1; + next; + } + + next unless ($line =3D~ m/_BLOCK/); + + my ($pkts, $bytes, $chain) =3D $line =3D~ m/^\s*(\d+\w?)\s+(\d+\w?)\s+(\= w+)_BLOCK/; + $stats{$chain}{$table} =3D [ $pkts, $bytes ]; + } + + close STATS; + + unlink( '/var/tmp/iptables.txt' ); +} + + +#---------------------------------------------------------------------------= --- +# sub is_running() +# +# Checks to see if the main script is running +#---------------------------------------------------------------------------= --- + +sub is_running +{ + return 0 unless (-r $lockfile); + + open LOCKFILE, '<', $lockfile or die "Can't open lockfile"; + my $pid =3D ; + close LOCKFILE; + + chomp $pid; + + return (-e "/proc/$pid"); +} + + +#---------------------------------------------------------------------------= --- +# sub show_running +# +# Displayed when update is running +#---------------------------------------------------------------------------= --- + +sub show_running +{ + # Open site + + Header::openpage( $Lang::tr{'ipblacklist'}, 1, '' ); + Header::openbigbox( '100%', 'center' ); + error(); + Header::openbox( 'Working', 'center', "$Lang::tr{'ipblacklist working'}" ); + + print < + + + 3D'$Lang::tr{'aktiv'}'  + + + +
+ + +END + + foreach my $name (keys %sources) + { + $stats{$name}{'size'} =3D ' ' if (not exists ($stats{$name}) and + exists $settings{$name} and + $settings{$name} eq 'on'); + } + + foreach my $name (sort keys %stats) + { + print "<= /tr>\n" if (exists $stats{$name}{'size'}); + } + + print < +END + + Header::closebox(); + + Header::closebigbox(); + Header::closepage(); +} + + +#---------------------------------------------------------------------------= --- +# sub error() +# +# Shows error messages +#---------------------------------------------------------------------------= --- + +sub error +{ + if ($errormessage) + { + Header::openbox('100%', 'left', $Lang::tr{'error messages'}); + print "$errormessage\n"; + print " \n"; + Header::closebox(); + } +} + + +#---------------------------------------------------------------------------= --- +# sub format_time( seconds ) +# +# Converts time in seconds to HH:MM:SS +#---------------------------------------------------------------------------= --- + +sub format_time($) { + my $time =3D shift; + + my $seconds =3D $time % 60; + my $minutes =3D $time / 60; + + my $hours =3D 0; + if ($minutes >=3D 60) { + $hours =3D $minutes / 60; + $minutes %=3D 60; + } + + return sprintf("%3d:%02d:%02d", $hours, $minutes, $seconds); +} diff --git a/html/cgi-bin/logs.cgi/log.dat b/html/cgi-bin/logs.cgi/log.dat index 8ca32d675..ba1a482c8 100644 --- a/html/cgi-bin/logs.cgi/log.dat +++ b/html/cgi-bin/logs.cgi/log.dat @@ -59,6 +59,7 @@ my %sections =3D ( 'dhcp' =3D> '(dhcpd: )', 'dma' =3D> '(dma: |dma\[.*\]: |postfix/\w*\[\d*\]: )', 'guardian' =3D> '(guardian\[.*\]: )', + 'ipblacklist' =3D> '(ipblacklist: )', 'ipfire' =3D> '(ipfire: )', 'ipsec' =3D> '(ipsec_[\w_]+: |pluto\[.*\]: |charon: |vpnwatch: )', 'kernel' =3D> '(kernel: (?!DROP_))', @@ -87,6 +88,7 @@ my %trsections =3D ( 'dhcp' =3D> "$Lang::tr{'dhcp server'}", 'dma' =3D> 'Mail', 'guardian' =3D> "$Lang::tr{'guardian'}", + 'ipblacklist' =3D> "$Lang::tr{'ipblacklist'}", 'ipfire' =3D> 'IPFire', 'ipsec' =3D> 'IPSec', 'kernel' =3D> "$Lang::tr{'kernel'}", diff --git a/langs/en/cgi-bin/en.pl b/langs/en/cgi-bin/en.pl index b40ef9390..5acf3678c 100644 --- a/langs/en/cgi-bin/en.pl +++ b/langs/en/cgi-bin/en.pl @@ -1518,6 +1518,37 @@ 'ip alias changed' =3D> 'External IP alias changed', 'ip alias removed' =3D> 'External IP alias removed', 'ip info' =3D> 'IP Information', +'ipblacklist auto list' =3D> 'Automatic blacklist', +'ipblacklist autoblacklist enable' =3D> 'Enable automatically updating local= blacklist', +'ipblacklist autoblacklist threshold' =3D> 'Threshold (packets/hour)', +'ipblacklist autoblacklist block time' =3D> 'Block time (seconds)', +'ipblacklist blacklist settings' =3D> 'Blacklist settings', +'ipblacklist bytes in' =3D> 'bytes in', +'ipblacklist bytes out' =3D> 'bytes out', +'ipblacklist check rate' =3D> 'Update check rate (hours)', +'ipblacklist day' =3D> 'day', +'ipblacklist disable pre' =3D> 'Disabling', +'ipblacklist disable mid' =3D> 'because it is included in', +'ipblacklist disable port' =3D> '', +'ipblacklist enable' =3D> 'Enable', +'ipblacklist entries' =3D> 'Entries', +'ipblacklist hour' =3D> 'hour', +'ipblacklist id' =3D> 'Blacklist', +'ipblacklist invalid block time' =3D> 'Invalid automatic blacklist block tim= e', +'ipblacklist invalid check rate' =3D> 'Invalid update check rate', +'ipblacklist invalid threshold' =3D> 'Invalid automatic blacklist threshold', +'ipblacklist log' =3D> 'Log dropped packets', +'ipblacklist name' =3D> 'Name', +'ipblacklist pkts in' =3D> 'pkts in', +'ipblacklist pkts out' =3D> 'pkts out', +'ipblacklist safe note' =3D> 'Note: safe blacklists block addresses that onl= y generate malicious traffic and therefore will not block any wanted sites.', +'ipblacklist safe' =3D> 'Safe', +'ipblacklist sixhour' =3D> 'six hours', +'ipblacklist updated' =3D> 'Last updated', +'ipblacklist use ipblacklists' =3D> 'Enable IP Blacklists', +'ipblacklist week' =3D> 'week', +'ipblacklist working' =3D> 'Updating IP address blacklists...', +'ipblacklist' =3D> 'IP Address Blacklists', 'ipfire has now rebooted' =3D> 'IPFire is rebooting now.', 'ipfire has now shutdown' =3D> 'IPFire is shutting down now.', 'ipfire side' =3D> 'IPFire side:', --=20 2.16.4 --===============2852044091131062013==--
$Lang::tr{'ipblacklist id'}$Lang::tr{'ipblacklist entri= es'}
$name$stats{$name}{'size'}