functions.fail2ban.inc.php 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242
  1. <?php
  2. function fail2ban($_action, $_data = null) {
  3. global $redis;
  4. $_data_log = $_data;
  5. switch ($_action) {
  6. case 'get':
  7. $f2b_options = array();
  8. if ($_SESSION['mailcow_cc_role'] != "admin") {
  9. return false;
  10. }
  11. try {
  12. $f2b_options = json_decode($redis->Get('F2B_OPTIONS'), true);
  13. $wl = $redis->hGetAll('F2B_WHITELIST');
  14. if (is_array($wl)) {
  15. foreach ($wl as $key => $value) {
  16. $tmp_wl_data[] = $key;
  17. }
  18. if (isset($tmp_wl_data)) {
  19. natsort($tmp_wl_data);
  20. $f2b_options['whitelist'] = implode(PHP_EOL, $tmp_wl_data);
  21. }
  22. else {
  23. $f2b_options['whitelist'] = "";
  24. }
  25. }
  26. else {
  27. $f2b_options['whitelist'] = "";
  28. }
  29. $bl = $redis->hGetAll('F2B_BLACKLIST');
  30. if (is_array($bl)) {
  31. foreach ($bl as $key => $value) {
  32. $tmp_bl_data[] = $key;
  33. }
  34. if (isset($tmp_bl_data)) {
  35. natsort($tmp_bl_data);
  36. $f2b_options['blacklist'] = implode(PHP_EOL, $tmp_bl_data);
  37. }
  38. else {
  39. $f2b_options['blacklist'] = "";
  40. }
  41. }
  42. else {
  43. $f2b_options['blacklist'] = "";
  44. }
  45. $pb = $redis->hGetAll('F2B_PERM_BANS');
  46. if (is_array($pb)) {
  47. foreach ($pb as $key => $value) {
  48. $f2b_options['perm_bans'][] = $key;
  49. }
  50. }
  51. else {
  52. $f2b_options['perm_bans'] = "";
  53. }
  54. $active_bans = $redis->hGetAll('F2B_ACTIVE_BANS');
  55. $queue_unban = $redis->hGetAll('F2B_QUEUE_UNBAN');
  56. if (is_array($active_bans)) {
  57. foreach ($active_bans as $network => $banned_until) {
  58. $queued_for_unban = (isset($queue_unban[$network]) && $queue_unban[$network] == 1) ? 1 : 0;
  59. $difference = $banned_until - time();
  60. $f2b_options['active_bans'][] = array(
  61. 'queued_for_unban' => $queued_for_unban,
  62. 'network' => $network,
  63. 'banned_until' => sprintf('%02dh %02dm %02ds', ($difference/3600), ($difference/60%60), $difference%60)
  64. );
  65. }
  66. }
  67. else {
  68. $f2b_options['active_bans'] = "";
  69. }
  70. }
  71. catch (RedisException $e) {
  72. $_SESSION['return'][] = array(
  73. 'type' => 'danger',
  74. 'log' => array(__FUNCTION__, $_action, $_data_log),
  75. 'msg' => array('redis_error', $e)
  76. );
  77. return false;
  78. }
  79. return $f2b_options;
  80. break;
  81. case 'edit':
  82. if ($_SESSION['mailcow_cc_role'] != "admin") {
  83. $_SESSION['return'][] = array(
  84. 'type' => 'danger',
  85. 'log' => array(__FUNCTION__, $_action, $_data_log),
  86. 'msg' => 'access_denied'
  87. );
  88. return false;
  89. }
  90. if (isset($_data['action']) && !empty($_data['network'])) {
  91. $networks = (array) $_data['network'];
  92. foreach ($networks as $network) {
  93. try {
  94. if ($_data['action'] == "unban") {
  95. if (valid_network($network)) {
  96. $redis->hSet('F2B_QUEUE_UNBAN', $network, 1);
  97. }
  98. }
  99. elseif ($_data['action'] == "whitelist") {
  100. if (valid_network($network)) {
  101. $redis->hSet('F2B_WHITELIST', $network, 1);
  102. $redis->hDel('F2B_BLACKLIST', $network, 1);
  103. $redis->hSet('F2B_QUEUE_UNBAN', $network, 1);
  104. }
  105. else {
  106. $_SESSION['return'][] = array(
  107. 'type' => 'danger',
  108. 'log' => array(__FUNCTION__, $_action, $_data_log),
  109. 'msg' => array('network_host_invalid', $network)
  110. );
  111. continue;
  112. }
  113. }
  114. elseif ($_data['action'] == "blacklist") {
  115. if (valid_network($network) && !in_array($network, array(
  116. '0.0.0.0',
  117. '0.0.0.0/0',
  118. getenv('IPV4_NETWORK') . '0/24',
  119. getenv('IPV4_NETWORK') . '0',
  120. getenv('IPV6_NETWORK')
  121. ))) {
  122. $redis->hSet('F2B_BLACKLIST', $network, 1);
  123. $redis->hDel('F2B_WHITELIST', $network, 1);
  124. //$response = docker('post', 'netfilter-mailcow', 'restart');
  125. }
  126. else {
  127. $_SESSION['return'][] = array(
  128. 'type' => 'danger',
  129. 'log' => array(__FUNCTION__, $_action, $_data_log),
  130. 'msg' => array('network_host_invalid', $network)
  131. );
  132. continue;
  133. }
  134. }
  135. }
  136. catch (RedisException $e) {
  137. $_SESSION['return'][] = array(
  138. 'type' => 'danger',
  139. 'log' => array(__FUNCTION__, $_action, $_data_log),
  140. 'msg' => array('redis_error', $e)
  141. );
  142. continue;
  143. }
  144. $_SESSION['return'][] = array(
  145. 'type' => 'success',
  146. 'log' => array(__FUNCTION__, $_action, $_data_log),
  147. 'msg' => array('object_modified', htmlspecialchars($network))
  148. );
  149. }
  150. return true;
  151. }
  152. $is_now = fail2ban('get');
  153. if (!empty($is_now)) {
  154. $ban_time = intval((isset($_data['ban_time'])) ? $_data['ban_time'] : $is_now['ban_time']);
  155. $max_attempts = intval((isset($_data['max_attempts'])) ? $_data['max_attempts'] : $is_now['active_int']);
  156. $retry_window = intval((isset($_data['retry_window'])) ? $_data['retry_window'] : $is_now['retry_window']);
  157. $netban_ipv4 = intval((isset($_data['netban_ipv4'])) ? $_data['netban_ipv4'] : $is_now['netban_ipv4']);
  158. $netban_ipv6 = intval((isset($_data['netban_ipv6'])) ? $_data['netban_ipv6'] : $is_now['netban_ipv6']);
  159. $wl = (isset($_data['whitelist'])) ? $_data['whitelist'] : $is_now['whitelist'];
  160. $bl = (isset($_data['blacklist'])) ? $_data['blacklist'] : $is_now['blacklist'];
  161. }
  162. else {
  163. $_SESSION['return'][] = array(
  164. 'type' => 'danger',
  165. 'log' => array(__FUNCTION__, $_action, $_data_log),
  166. 'msg' => 'access_denied'
  167. );
  168. return false;
  169. }
  170. $f2b_options = array();
  171. $f2b_options['ban_time'] = ($ban_time < 60) ? 60 : $ban_time;
  172. $f2b_options['netban_ipv4'] = ($netban_ipv4 < 8) ? 8 : $netban_ipv4;
  173. $f2b_options['netban_ipv6'] = ($netban_ipv6 < 8) ? 8 : $netban_ipv6;
  174. $f2b_options['netban_ipv4'] = ($netban_ipv4 > 32) ? 32 : $netban_ipv4;
  175. $f2b_options['netban_ipv6'] = ($netban_ipv6 > 128) ? 128 : $netban_ipv6;
  176. $f2b_options['max_attempts'] = ($max_attempts < 1) ? 1 : $max_attempts;
  177. $f2b_options['retry_window'] = ($retry_window < 1) ? 1 : $retry_window;
  178. try {
  179. $redis->Set('F2B_OPTIONS', json_encode($f2b_options));
  180. $redis->Del('F2B_WHITELIST');
  181. $redis->Del('F2B_BLACKLIST');
  182. if(!empty($wl)) {
  183. $wl_array = array_map('trim', preg_split( "/( |,|;|\n)/", $wl));
  184. $wl_array = array_filter($wl_array);
  185. if (is_array($wl_array)) {
  186. foreach ($wl_array as $wl_item) {
  187. if (valid_network($wl_item) || valid_hostname($wl_item)) {
  188. $redis->hSet('F2B_WHITELIST', $wl_item, 1);
  189. }
  190. else {
  191. $_SESSION['return'][] = array(
  192. 'type' => 'danger',
  193. 'log' => array(__FUNCTION__, $_action, $_data_log),
  194. 'msg' => array('network_host_invalid', $wl_item)
  195. );
  196. continue;
  197. }
  198. }
  199. }
  200. }
  201. if(!empty($bl)) {
  202. $bl_array = array_map('trim', preg_split( "/( |,|;|\n)/", $bl));
  203. $bl_array = array_filter($bl_array);
  204. if (is_array($bl_array)) {
  205. foreach ($bl_array as $bl_item) {
  206. if (valid_network($bl_item) && !in_array($bl_item, array(
  207. '0.0.0.0',
  208. '0.0.0.0/0',
  209. getenv('IPV4_NETWORK') . '0/24',
  210. getenv('IPV4_NETWORK') . '0',
  211. getenv('IPV6_NETWORK')
  212. ))) {
  213. $redis->hSet('F2B_BLACKLIST', $bl_item, 1);
  214. }
  215. else {
  216. $_SESSION['return'][] = array(
  217. 'type' => 'danger',
  218. 'log' => array(__FUNCTION__, $_action, $_data_log),
  219. 'msg' => array('network_host_invalid', $bl_item)
  220. );
  221. continue;
  222. }
  223. }
  224. }
  225. }
  226. }
  227. catch (RedisException $e) {
  228. $_SESSION['return'][] = array(
  229. 'type' => 'danger',
  230. 'log' => array(__FUNCTION__, $_action, $_data_log),
  231. 'msg' => array('redis_error', $e)
  232. );
  233. return false;
  234. }
  235. $_SESSION['return'][] = array(
  236. 'type' => 'success',
  237. 'log' => array(__FUNCTION__, $_action, $_data_log),
  238. 'msg' => 'f2b_modified'
  239. );
  240. break;
  241. }
  242. }