functions.fail2ban.inc.php 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110
  1. <?php
  2. function fail2ban($_action, $_data = null) {
  3. global $redis;
  4. global $lang;
  5. switch ($_action) {
  6. case 'get':
  7. $data = array();
  8. if ($_SESSION['mailcow_cc_role'] != "admin") {
  9. return false;
  10. }
  11. try {
  12. $data['ban_time'] = $redis->Get('F2B_BAN_TIME');
  13. $data['max_attempts'] = $redis->Get('F2B_MAX_ATTEMPTS');
  14. $data['retry_window'] = $redis->Get('F2B_RETRY_WINDOW');
  15. $data['netban_ipv4'] = $redis->Get('F2B_NETBAN_IPV4');
  16. $data['netban_ipv6'] = $redis->Get('F2B_NETBAN_IPV6');
  17. $wl = $redis->hGetAll('F2B_WHITELIST');
  18. if (is_array($wl)) {
  19. foreach ($wl as $key => $value) {
  20. $tmp_data[] = $key;
  21. }
  22. if (isset($tmp_data)) {
  23. $data['whitelist'] = implode(PHP_EOL, $tmp_data);
  24. }
  25. else {
  26. $data['whitelist'] = "";
  27. }
  28. }
  29. else {
  30. $data['whitelist'] = "";
  31. }
  32. }
  33. catch (RedisException $e) {
  34. $_SESSION['return'] = array(
  35. 'type' => 'danger',
  36. 'msg' => 'Redis: '.$e
  37. );
  38. return false;
  39. }
  40. return $data;
  41. break;
  42. case 'edit':
  43. if ($_SESSION['mailcow_cc_role'] != "admin") {
  44. $_SESSION['return'] = array(
  45. 'type' => 'danger',
  46. 'msg' => sprintf($lang['danger']['access_denied'])
  47. );
  48. return false;
  49. }
  50. $is_now = fail2ban('get');
  51. if (!empty($is_now)) {
  52. $ban_time = intval((isset($_data['ban_time'])) ? $_data['ban_time'] : $is_now['ban_time']);
  53. $max_attempts = intval((isset($_data['max_attempts'])) ? $_data['max_attempts'] : $is_now['active_int']);
  54. $retry_window = intval((isset($_data['retry_window'])) ? $_data['retry_window'] : $is_now['retry_window']);
  55. $netban_ipv4 = intval((isset($_data['netban_ipv4'])) ? $_data['netban_ipv4'] : $is_now['netban_ipv4']);
  56. $netban_ipv6 = intval((isset($_data['netban_ipv6'])) ? $_data['netban_ipv6'] : $is_now['netban_ipv6']);
  57. }
  58. else {
  59. $_SESSION['return'] = array(
  60. 'type' => 'danger',
  61. 'msg' => sprintf($lang['danger']['access_denied'])
  62. );
  63. return false;
  64. }
  65. $wl = $_data['whitelist'];
  66. $ban_time = ($ban_time < 60) ? 60 : $ban_time;
  67. $netban_ipv4 = ($netban_ipv4 < 8) ? 8 : $netban_ipv4;
  68. $netban_ipv6 = ($netban_ipv6 < 8) ? 8 : $netban_ipv6;
  69. $netban_ipv4 = ($netban_ipv4 > 32) ? 32 : $netban_ipv4;
  70. $netban_ipv6 = ($netban_ipv6 > 128) ? 128 : $netban_ipv6;
  71. $max_attempts = ($max_attempts < 1) ? 1 : $max_attempts;
  72. $retry_window = ($retry_window < 1) ? 1 : $retry_window;
  73. try {
  74. $redis->Set('F2B_BAN_TIME', $ban_time);
  75. $redis->Set('F2B_MAX_ATTEMPTS', $max_attempts);
  76. $redis->Set('F2B_RETRY_WINDOW', $retry_window);
  77. $redis->Set('F2B_NETBAN_IPV4', $netban_ipv4);
  78. $redis->Set('F2B_NETBAN_IPV6', $netban_ipv6);
  79. $redis->Del('F2B_WHITELIST');
  80. if(!empty($wl)) {
  81. $wl_array = array_map('trim', preg_split( "/( |,|;|\n)/", $wl));
  82. if (is_array($wl_array)) {
  83. foreach ($wl_array as $wl_item) {
  84. $cidr = explode('/', $wl_item);
  85. if (filter_var($cidr[0], FILTER_VALIDATE_IP, FILTER_FLAG_IPV4) && (!isset($cidr[1]) || ($cidr[1] >= 0 && $cidr[1] <= 32))) {
  86. $redis->hSet('F2B_WHITELIST', $wl_item, 1);
  87. }
  88. elseif (filter_var($cidr[0], FILTER_VALIDATE_IP, FILTER_FLAG_IPV6) && (!isset($cidr[1]) || ($cidr[1] >= 0 && $cidr[1] <= 128))) {
  89. $redis->hSet('F2B_WHITELIST', $wl_item, 1);
  90. }
  91. }
  92. }
  93. }
  94. }
  95. catch (RedisException $e) {
  96. $_SESSION['return'] = array(
  97. 'type' => 'danger',
  98. 'msg' => 'Redis: '.$e
  99. );
  100. return false;
  101. }
  102. $_SESSION['return'] = array(
  103. 'type' => 'success',
  104. 'msg' => sprintf($lang['success']['f2b_modified'])
  105. );
  106. break;
  107. }
  108. }