mirror of
https://github.com/vincentmli/bpfire.git
synced 2026-04-10 19:15:54 +02:00
Changed redirector to be more dynamic and handle new redirectors Changed proxy cgi to support one new redirector and allways use the default one Added recent changes to core 11 Changed clamd.conf file to handle streams up to 50M and not using the default value Started building squidclamav redirector to scan for viruses when using the proxy(builded blackbox may lead to errors), core11 must be installed
151 lines
4.2 KiB
Perl
Executable File
151 lines
4.2 KiB
Perl
Executable File
#!/usr/bin/perl
|
|
###############################################################################
|
|
# #
|
|
# IPFire.org - A linux based firewall #
|
|
# Copyright (C) 2007 Michael Tremer & Christian Schmidt #
|
|
# #
|
|
# This program is free software: you can redistribute it and/or modify #
|
|
# it under the terms of the GNU General Public License as published by #
|
|
# the Free Software Foundation, either version 3 of the License, or #
|
|
# (at your option) any later version. #
|
|
# #
|
|
# This program is distributed in the hope that it will be useful, #
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of #
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
|
|
# GNU General Public License for more details. #
|
|
# #
|
|
# You should have received a copy of the GNU General Public License #
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>. #
|
|
# #
|
|
###############################################################################
|
|
|
|
use CGI qw(param);
|
|
|
|
# enable only the following on debugging purpose
|
|
use warnings;
|
|
use CGI::Carp 'fatalsToBrowser';
|
|
|
|
$swroot="/var/ipfire";
|
|
&readhash("$swroot/ethernet/settings", \%netsettings);
|
|
|
|
my $TITLE_VIRUS = "SquidClamAv Virus detection";
|
|
|
|
my $url = param('url') || '';
|
|
my $virus = param('virus') || '';
|
|
my $source = param('source') || '';
|
|
$source =~ s/\/-//;
|
|
my $user = param('user') || '';
|
|
|
|
|
|
# Remove clamd infos
|
|
$virus =~ s/stream: //;
|
|
$virus =~ s/ FOUND//;
|
|
|
|
print "Pragma: no-cache\n";
|
|
print "Cache-control: no-cache\n";
|
|
print "Connection: close\n";
|
|
print "Content-type: text/html\n\n";
|
|
|
|
print <<END
|
|
|
|
<html>
|
|
<head>
|
|
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
|
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
|
|
<title>ACCESS MESSAGE</title>
|
|
</head>
|
|
|
|
<body>
|
|
<table width="100%" height='100%' border="0">
|
|
<tr>
|
|
<td colspan='3' width='100%' height='130' align="center" background="http://$netsettings{'GREEN_ADDRESS'}:81/images/background.gif">
|
|
<tr> <td width='10%'><td align='center' bgcolor='#CC000000' width='80%'><font face="verdana, arial, sans serif" color="#FFFFFF" size="5">
|
|
<b>$TITLE_VIRUS</b>
|
|
</font>
|
|
<td width='10%'>
|
|
END
|
|
;
|
|
|
|
if (!($virus eq ""))
|
|
{
|
|
print <<END
|
|
<tr> <td colspan='3' align='center'>
|
|
<font face="verdana, arial, sans serif" color="#CC000000" size="1">
|
|
<b>$virus found</b>
|
|
</font>
|
|
END
|
|
;
|
|
}
|
|
print <<END
|
|
<tr>
|
|
<td colspan='3' align="center">
|
|
<font face="verdana, arial, sans serif" color="#000000" size="4">
|
|
<b>Access to the requested page has been denied</b>
|
|
</font>
|
|
<font face="verdana,arial,sans serif" color="#000000" size="2">
|
|
END
|
|
;
|
|
|
|
if (!($url eq ""))
|
|
{
|
|
print <<END
|
|
<p>URL: <a href="$url">$url</a>
|
|
END
|
|
;
|
|
}
|
|
|
|
if (!($source eq ""))
|
|
{
|
|
print <<END
|
|
<p>Client IP address: <i>$source</i>
|
|
END
|
|
;
|
|
}
|
|
|
|
print <<END
|
|
<br><p>Please contact the Network Administrator if you think there has been an error
|
|
</font>
|
|
|
|
<tr>
|
|
<td colspan='3' height='60%' valign="bottom" align="right">
|
|
<font face="verdana,arial,sans serif" color="#656565" size="1">Web Filtering by
|
|
</font>
|
|
<a href="http://www.ipfire.org" target="_blank"><b>
|
|
<font face="verdana,arial,sans serif" color="#656565" size="1">IPFire</b></a>
|
|
</font>
|
|
|
|
</table>
|
|
</body>
|
|
|
|
</html>
|
|
END
|
|
;
|
|
|
|
sub readhash
|
|
{
|
|
my $filename = $_[0];
|
|
my $hash = $_[1];
|
|
my ($var, $val);
|
|
|
|
if (-e $filename)
|
|
{
|
|
open(FILE, $filename) or die "Unable to read file $filename";
|
|
while (<FILE>)
|
|
{
|
|
chop;
|
|
($var, $val) = split /=/, $_, 2;
|
|
if ($var)
|
|
{
|
|
$val =~ s/^\'//g;
|
|
$val =~ s/\'$//g;
|
|
|
|
# Untaint variables read from hash
|
|
$var =~ /([A-Za-z0-9_-]*)/; $var = $1;
|
|
$val =~ /([\w\W]*)/; $val = $1;
|
|
$hash->{$var} = $val;
|
|
}
|
|
}
|
|
close FILE;
|
|
}
|
|
}
|