functions.fail2ban.inc.php 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134
  1. <?php
  2. function fail2ban($_action, $_data = null) {
  3. global $redis;
  4. global $lang;
  5. switch ($_action) {
  6. case 'get':
  7. $f2b_options = array();
  8. if ($_SESSION['mailcow_cc_role'] != "admin") {
  9. return false;
  10. }
  11. try {
  12. $f2b_options = json_decode($redis->Get('F2B_OPTIONS'), true);
  13. $wl = $redis->hGetAll('F2B_WHITELIST');
  14. if (is_array($wl)) {
  15. foreach ($wl as $key => $value) {
  16. $tmp_wl_data[] = $key;
  17. }
  18. if (isset($tmp_wl_data)) {
  19. sort($tmp_wl_data);
  20. $f2b_options['whitelist'] = implode(PHP_EOL, $tmp_wl_data);
  21. }
  22. else {
  23. $f2b_options['whitelist'] = "";
  24. }
  25. }
  26. else {
  27. $f2b_options['whitelist'] = "";
  28. }
  29. $bl = $redis->hGetAll('F2B_BLACKLIST');
  30. if (is_array($bl)) {
  31. foreach ($bl as $key => $value) {
  32. $tmp_bl_data[] = $key;
  33. }
  34. if (isset($tmp_bl_data)) {
  35. sort($tmp_bl_data);
  36. $f2b_options['blacklist'] = implode(PHP_EOL, $tmp_bl_data);
  37. }
  38. else {
  39. $f2b_options['blacklist'] = "";
  40. }
  41. }
  42. else {
  43. $f2b_options['blacklist'] = "";
  44. }
  45. }
  46. catch (RedisException $e) {
  47. $_SESSION['return'] = array(
  48. 'type' => 'danger',
  49. 'msg' => 'Redis: '.$e
  50. );
  51. return false;
  52. }
  53. return $f2b_options;
  54. break;
  55. case 'edit':
  56. if ($_SESSION['mailcow_cc_role'] != "admin") {
  57. $_SESSION['return'] = array(
  58. 'type' => 'danger',
  59. 'msg' => sprintf($lang['danger']['access_denied'])
  60. );
  61. return false;
  62. }
  63. $is_now = fail2ban('get');
  64. if (!empty($is_now)) {
  65. $ban_time = intval((isset($_data['ban_time'])) ? $_data['ban_time'] : $is_now['ban_time']);
  66. $max_attempts = intval((isset($_data['max_attempts'])) ? $_data['max_attempts'] : $is_now['active_int']);
  67. $retry_window = intval((isset($_data['retry_window'])) ? $_data['retry_window'] : $is_now['retry_window']);
  68. $netban_ipv4 = intval((isset($_data['netban_ipv4'])) ? $_data['netban_ipv4'] : $is_now['netban_ipv4']);
  69. $netban_ipv6 = intval((isset($_data['netban_ipv6'])) ? $_data['netban_ipv6'] : $is_now['netban_ipv6']);
  70. $wl = (isset($_data['whitelist'])) ? $_data['whitelist'] : $is_now['whitelist'];
  71. $bl = (isset($_data['blacklist'])) ? $_data['blacklist'] : $is_now['blacklist'];
  72. }
  73. else {
  74. $_SESSION['return'] = array(
  75. 'type' => 'danger',
  76. 'msg' => sprintf($lang['danger']['access_denied'])
  77. );
  78. return false;
  79. }
  80. $f2b_options = array();
  81. $f2b_options['ban_time'] = ($ban_time < 60) ? 60 : $ban_time;
  82. $f2b_options['netban_ipv4'] = ($netban_ipv4 < 8) ? 8 : $netban_ipv4;
  83. $f2b_options['netban_ipv6'] = ($netban_ipv6 < 8) ? 8 : $netban_ipv6;
  84. $f2b_options['netban_ipv4'] = ($netban_ipv4 > 32) ? 32 : $netban_ipv4;
  85. $f2b_options['netban_ipv6'] = ($netban_ipv6 > 128) ? 128 : $netban_ipv6;
  86. $f2b_options['max_attempts'] = ($max_attempts < 1) ? 1 : $max_attempts;
  87. $f2b_options['retry_window'] = ($retry_window < 1) ? 1 : $retry_window;
  88. try {
  89. $redis->Set('F2B_OPTIONS', json_encode($f2b_options));
  90. $redis->Del('F2B_WHITELIST');
  91. $redis->Del('F2B_BLACKLIST');
  92. if(!empty($wl)) {
  93. $wl_array = array_map('trim', preg_split( "/( |,|;|\n)/", $wl));
  94. if (is_array($wl_array)) {
  95. foreach ($wl_array as $wl_item) {
  96. $cidr = explode('/', $wl_item);
  97. if (filter_var($cidr[0], FILTER_VALIDATE_IP, FILTER_FLAG_IPV4) && (!isset($cidr[1]) || ($cidr[1] >= 0 && $cidr[1] <= 32))) {
  98. $redis->hSet('F2B_WHITELIST', $wl_item, 1);
  99. }
  100. elseif (filter_var($cidr[0], FILTER_VALIDATE_IP, FILTER_FLAG_IPV6) && (!isset($cidr[1]) || ($cidr[1] >= 0 && $cidr[1] <= 128))) {
  101. $redis->hSet('F2B_WHITELIST', $wl_item, 1);
  102. }
  103. }
  104. }
  105. }
  106. if(!empty($bl)) {
  107. $bl_array = array_map('trim', preg_split( "/( |,|;|\n)/", $bl));
  108. if (is_array($bl_array)) {
  109. foreach ($bl_array as $bl_item) {
  110. $cidr = explode('/', $bl_item);
  111. if (filter_var($cidr[0], FILTER_VALIDATE_IP, FILTER_FLAG_IPV4) && (!isset($cidr[1]) || ($cidr[1] >= 0 && $cidr[1] <= 32))) {
  112. $redis->hSet('F2B_BLACKLIST', $bl_item, 1);
  113. }
  114. elseif (filter_var($cidr[0], FILTER_VALIDATE_IP, FILTER_FLAG_IPV6) && (!isset($cidr[1]) || ($cidr[1] >= 0 && $cidr[1] <= 128))) {
  115. $redis->hSet('F2B_BLACKLIST', $bl_item, 1);
  116. }
  117. }
  118. }
  119. }
  120. }
  121. catch (RedisException $e) {
  122. $_SESSION['return'] = array(
  123. 'type' => 'danger',
  124. 'msg' => 'Redis: '.$e
  125. );
  126. return false;
  127. }
  128. $_SESSION['return'] = array(
  129. 'type' => 'success',
  130. 'msg' => sprintf($lang['success']['f2b_modified'])
  131. );
  132. break;
  133. }
  134. }