mirror of
https://github.com/vincentmli/bpfire.git
synced 2026-04-23 01:12:57 +02:00
ids.cgi: Drop guardian related code.
Guardian competely will be managed by it's own CGI. Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
This commit is contained in:
@@ -55,16 +55,7 @@ $snortsettings{'ENABLE_SNORT'} = 'off';
|
||||
$snortsettings{'ENABLE_SNORT_GREEN'} = 'off';
|
||||
$snortsettings{'ENABLE_SNORT_BLUE'} = 'off';
|
||||
$snortsettings{'ENABLE_SNORT_ORANGE'} = 'off';
|
||||
$snortsettings{'ENABLE_GUARDIAN'} = 'off';
|
||||
$snortsettings{'GUARDIAN_INTERFACE'} = `cat /var/ipfire/red/iface`;
|
||||
$snortsettings{'GUARDIAN_HOSTGATEWAYBYTE'} = '1';
|
||||
$snortsettings{'GUARDIAN_LOGFILE'} = '/var/log/guardian/guardian.log';
|
||||
$snortsettings{'GUARDIAN_ALERTFILE'} = '/var/log/snort/alert';
|
||||
$snortsettings{'GUARDIAN_IGNOREFILE'} = '/var/ipfire/guardian/guardian.ignore';
|
||||
$snortsettings{'GUARDIAN_TARGETFILE'} = '/var/ipfire/guardian/guardian.target';
|
||||
$snortsettings{'GUARDIAN_TIMELIMIT'} = '86400';
|
||||
$snortsettings{'ACTION'} = '';
|
||||
$snortsettings{'ACTION2'} = '';
|
||||
$snortsettings{'RULES'} = '';
|
||||
$snortsettings{'OINKCODE'} = '';
|
||||
$snortsettings{'INSTALLDATE'} = '';
|
||||
@@ -311,39 +302,11 @@ if ($snortsettings{'ACTION'} eq $Lang::tr{'save'} && $snortsettings{'ACTION2'} e
|
||||
} else {
|
||||
unlink "${General::swroot}/snort/enable_preprocessor_http_inspect";
|
||||
}
|
||||
if ($snortsettings{'ENABLE_GUARDIAN'} eq 'on')
|
||||
{
|
||||
system ('/usr/bin/touch', "${General::swroot}/guardian/enable");
|
||||
} else {
|
||||
unlink "${General::swroot}/guardian/enable";
|
||||
}
|
||||
|
||||
system('/usr/local/bin/snortctrl restart >/dev/null');
|
||||
|
||||
} elsif ($snortsettings{'ACTION'} eq $Lang::tr{'save'} && $snortsettings{'ACTION2'} eq "guardian" ){
|
||||
foreach my $key (keys %snortsettings){
|
||||
if ( $key !~ /^GUARDIAN/ ){
|
||||
delete $snortsettings{$key};
|
||||
}
|
||||
}
|
||||
&General::writehashpart("${General::swroot}/snort/settings", \%snortsettings);
|
||||
open(IGNOREFILE, ">$snortsettings{'GUARDIAN_IGNOREFILE'}") or die "Unable to write guardian ignore file $snortsettings{'GUARDIAN_IGNOREFILE'}";
|
||||
print IGNOREFILE $snortsettings{'GUARDIAN_IGNOREFILE_CONTENT'};
|
||||
close(IGNOREFILE);
|
||||
open(GUARDIAN, ">/var/ipfire/guardian/guardian.conf") or die "Unable to write guardian conf /var/ipfire/guardian/guardian.conf";
|
||||
print GUARDIAN <<END
|
||||
Interface $snortsettings{'GUARDIAN_INTERFACE'}
|
||||
HostGatewayByte $snortsettings{'GUARDIAN_HOSTGATEWAYBYTE'}
|
||||
LogFile $snortsettings{'GUARDIAN_LOGFILE'}
|
||||
AlertFile $snortsettings{'GUARDIAN_ALERTFILE'}
|
||||
IgnoreFile $snortsettings{'GUARDIAN_IGNOREFILE'}
|
||||
TargetFile $snortsettings{'GUARDIAN_TARGETFILE'}
|
||||
TimeLimit $snortsettings{'GUARDIAN_TIMELIMIT'}
|
||||
END
|
||||
;
|
||||
close(GUARDIAN);
|
||||
system('/usr/local/bin/snortctrl restart >/dev/null');
|
||||
}
|
||||
|
||||
# INSTALLMD5 is not in the form, so not retrieved by getcgihash
|
||||
&General::readhash("${General::swroot}/snort/settings", \%snortsettings);
|
||||
|
||||
@@ -400,9 +363,6 @@ $checked{'ENABLE_SNORT_BLUE'}{$snortsettings{'ENABLE_SNORT_BLUE'}} = "checked='c
|
||||
$checked{'ENABLE_SNORT_ORANGE'}{'off'} = '';
|
||||
$checked{'ENABLE_SNORT_ORANGE'}{'on'} = '';
|
||||
$checked{'ENABLE_SNORT_ORANGE'}{$snortsettings{'ENABLE_SNORT_ORANGE'}} = "checked='checked'";
|
||||
$checked{'ENABLE_GUARDIAN'}{'off'} = '';
|
||||
$checked{'ENABLE_GUARDIAN'}{'on'} = '';
|
||||
$checked{'ENABLE_GUARDIAN'}{$snortsettings{'ENABLE_GUARDIAN'}} = "checked='checked'";
|
||||
$selected{'RULES'}{'nothing'} = '';
|
||||
$selected{'RULES'}{'community'} = '';
|
||||
$selected{'RULES'}{'emerging'} = '';
|
||||
@@ -504,9 +464,6 @@ if ($netsettings{'ORANGE_DEV'} ne '') {
|
||||
print " <input type='checkbox' name='ENABLE_SNORT_ORANGE' $checked{'ENABLE_SNORT_ORANGE'}{'on'} /> ORANGE Snort";
|
||||
}
|
||||
print " <input type='checkbox' name='ENABLE_SNORT' $checked{'ENABLE_SNORT'}{'on'} /> RED Snort";
|
||||
if ( -e "/var/ipfire/guardian/guardian.conf" ) {
|
||||
print " <input type='checkbox' name='ENABLE_GUARDIAN' $checked{'ENABLE_GUARDIAN'}{'on'} /> Guardian";
|
||||
}
|
||||
|
||||
print <<END
|
||||
</td></tr>
|
||||
@@ -564,32 +521,6 @@ if ($results ne '') {
|
||||
|
||||
&Header::closebox();
|
||||
|
||||
####################### Added for guardian control ####################################
|
||||
if ( -e "/var/ipfire/guardian/guardian.conf" ) {
|
||||
&Header::openbox('100%', 'LEFT', $Lang::tr{'guardian configuration'});
|
||||
print <<END
|
||||
<form method='post' action='$ENV{'SCRIPT_NAME'}'><table width='100%'>
|
||||
<tr><td align='left' width='40%'>$Lang::tr{'guardian interface'}</td><td align='left'><input type='text' name='GUARDIAN_INTERFACE' value='$snortsettings{'GUARDIAN_INTERFACE'}' size="30" /></td></tr>
|
||||
<tr><td align='left' width='40%'>$Lang::tr{'guardian timelimit'}</td><td align='left'><input type='text' name='GUARDIAN_TIMELIMIT' value='$snortsettings{'GUARDIAN_TIMELIMIT'}' size="30" /></td></tr>
|
||||
<tr><td align='left' width='40%'>$Lang::tr{'guardian logfile'}</td><td align='left'><input type='text' name='GUARDIAN_LOGFILE' value='$snortsettings{'GUARDIAN_LOGFILE'}' size="30" /></td></tr>
|
||||
<tr><td align='left' width='40%'>$Lang::tr{'guardian alertfile'}</td><td align='left'><input type='text' name='GUARDIAN_ALERTFILE' value='$snortsettings{'GUARDIAN_ALERTFILE'}' size="30" /></td></tr>
|
||||
<tr><td align='left' width='40%'>$Lang::tr{'guardian ignorefile'}</td><td align='left'><textarea name='GUARDIAN_IGNOREFILE_CONTENT' cols='32' rows='6' wrap='off'>
|
||||
END
|
||||
;
|
||||
print `cat /var/ipfire/guardian/guardian.ignore`;
|
||||
print <<END
|
||||
</textarea></td></tr>
|
||||
<tr><td align='right' colspan='2'><input type='hidden' name='ACTION2' value='guardian' /><input type='submit' name='ACTION' value='$Lang::tr{'save'}' /></td></tr>
|
||||
</table>
|
||||
</form>
|
||||
END
|
||||
;
|
||||
&Header::closebox();
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
####################### Added for snort rules control #################################
|
||||
if ( -e "${General::swroot}/snort/enable" || -e "${General::swroot}/snort/enable_green" || -e "${General::swroot}/snort/enable_blue" || -e "${General::swroot}/snort/enable_orange" ) {
|
||||
&Header::openbox('100%', 'LEFT', $Lang::tr{'intrusion detection system rules'});
|
||||
|
||||
Reference in New Issue
Block a user