functions.fail2ban.inc.php 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228
  1. <?php
  2. function valid_network($network) {
  3. $cidr = explode('/', $network);
  4. if (filter_var($cidr[0], FILTER_VALIDATE_IP, FILTER_FLAG_IPV4) && (!isset($cidr[1]) || ($cidr[1] >= 0 && $cidr[1] <= 32))) {
  5. return true;
  6. }
  7. elseif (filter_var($cidr[0], FILTER_VALIDATE_IP, FILTER_FLAG_IPV6) && (!isset($cidr[1]) || ($cidr[1] >= 0 && $cidr[1] <= 128))) {
  8. return true;
  9. }
  10. return false;
  11. }
  12. function valid_hostname($hostname) {
  13. return filter_var($hostname, FILTER_VALIDATE_DOMAIN, FILTER_FLAG_HOSTNAME);
  14. }
  15. function fail2ban($_action, $_data = null) {
  16. global $redis;
  17. global $lang;
  18. $_data_log = $_data;
  19. switch ($_action) {
  20. case 'get':
  21. $f2b_options = array();
  22. if ($_SESSION['mailcow_cc_role'] != "admin") {
  23. return false;
  24. }
  25. try {
  26. $f2b_options = json_decode($redis->Get('F2B_OPTIONS'), true);
  27. $wl = $redis->hGetAll('F2B_WHITELIST');
  28. if (is_array($wl)) {
  29. foreach ($wl as $key => $value) {
  30. $tmp_wl_data[] = $key;
  31. }
  32. if (isset($tmp_wl_data)) {
  33. sort($tmp_wl_data);
  34. $f2b_options['whitelist'] = implode(PHP_EOL, $tmp_wl_data);
  35. }
  36. else {
  37. $f2b_options['whitelist'] = "";
  38. }
  39. }
  40. else {
  41. $f2b_options['whitelist'] = "";
  42. }
  43. $bl = $redis->hGetAll('F2B_BLACKLIST');
  44. if (is_array($bl)) {
  45. foreach ($bl as $key => $value) {
  46. $tmp_bl_data[] = $key;
  47. }
  48. if (isset($tmp_bl_data)) {
  49. sort($tmp_bl_data);
  50. $f2b_options['blacklist'] = implode(PHP_EOL, $tmp_bl_data);
  51. }
  52. else {
  53. $f2b_options['blacklist'] = "";
  54. }
  55. }
  56. else {
  57. $f2b_options['blacklist'] = "";
  58. }
  59. $pb = $redis->hGetAll('F2B_PERM_BANS');
  60. if (is_array($pb)) {
  61. foreach ($pb as $key => $value) {
  62. $f2b_options['perm_bans'][] = $key;
  63. }
  64. }
  65. else {
  66. $f2b_options['perm_bans'] = "";
  67. }
  68. $active_bans = $redis->hGetAll('F2B_ACTIVE_BANS');
  69. $queue_unban = $redis->hGetAll('F2B_QUEUE_UNBAN');
  70. if (is_array($active_bans)) {
  71. foreach ($active_bans as $network => $banned_until) {
  72. $queued_for_unban = (isset($queue_unban[$network]) && $queue_unban[$network] == 1) ? 1 : 0;
  73. $difference = $banned_until - time();
  74. $f2b_options['active_bans'][] = array(
  75. 'queued_for_unban' => $queued_for_unban,
  76. 'network' => $network,
  77. 'banned_until' => sprintf('%02dh %02dm %02ds', ($difference/3600), ($difference/60%60), $difference%60)
  78. );
  79. }
  80. }
  81. else {
  82. $f2b_options['active_bans'] = "";
  83. }
  84. }
  85. catch (RedisException $e) {
  86. $_SESSION['return'][] = array(
  87. 'type' => 'danger',
  88. 'log' => array(__FUNCTION__, $_action, $_data_log),
  89. 'msg' => array('redis_error', $e)
  90. );
  91. return false;
  92. }
  93. return $f2b_options;
  94. break;
  95. case 'edit':
  96. if ($_SESSION['mailcow_cc_role'] != "admin") {
  97. $_SESSION['return'][] = array(
  98. 'type' => 'danger',
  99. 'log' => array(__FUNCTION__, $_action, $_data_log),
  100. 'msg' => 'access_denied'
  101. );
  102. return false;
  103. }
  104. if (isset($_data['action']) && !empty($_data['network'])) {
  105. $networks = (array) $_data['network'];
  106. foreach ($networks as $network) {
  107. try {
  108. if ($_data['action'] == "unban") {
  109. if (valid_network($network)) {
  110. $redis->hSet('F2B_QUEUE_UNBAN', $network, 1);
  111. }
  112. }
  113. elseif ($_data['action'] == "whitelist") {
  114. if (valid_network($network)) {
  115. $redis->hSet('F2B_WHITELIST', $network, 1);
  116. $redis->hDel('F2B_BLACKLIST', $network, 1);
  117. $redis->hSet('F2B_QUEUE_UNBAN', $network, 1);
  118. }
  119. else {
  120. $_SESSION['return'][] = array(
  121. 'type' => 'danger',
  122. 'log' => array(__FUNCTION__, $_action, $_data_log),
  123. 'msg' => array('network_host_invalid', $network)
  124. );
  125. continue;
  126. }
  127. }
  128. elseif ($_data['action'] == "blacklist") {
  129. if (valid_network($network)) {
  130. $redis->hSet('F2B_BLACKLIST', $network, 1);
  131. $redis->hDel('F2B_WHITELIST', $network, 1);
  132. //$response = docker('post', 'netfilter-mailcow', 'restart');
  133. }
  134. else {
  135. $_SESSION['return'][] = array(
  136. 'type' => 'danger',
  137. 'log' => array(__FUNCTION__, $_action, $_data_log),
  138. 'msg' => array('network_host_invalid', $network)
  139. );
  140. continue;
  141. }
  142. }
  143. }
  144. catch (RedisException $e) {
  145. $_SESSION['return'][] = array(
  146. 'type' => 'danger',
  147. 'log' => array(__FUNCTION__, $_action, $_data_log),
  148. 'msg' => array('redis_error', $e)
  149. );
  150. continue;
  151. }
  152. $_SESSION['return'][] = array(
  153. 'type' => 'success',
  154. 'log' => array(__FUNCTION__, $_action, $_data_log),
  155. 'msg' => array('object_modified', htmlspecialchars($network))
  156. );
  157. }
  158. return true;
  159. }
  160. $is_now = fail2ban('get');
  161. if (!empty($is_now)) {
  162. $ban_time = intval((isset($_data['ban_time'])) ? $_data['ban_time'] : $is_now['ban_time']);
  163. $max_attempts = intval((isset($_data['max_attempts'])) ? $_data['max_attempts'] : $is_now['active_int']);
  164. $retry_window = intval((isset($_data['retry_window'])) ? $_data['retry_window'] : $is_now['retry_window']);
  165. $netban_ipv4 = intval((isset($_data['netban_ipv4'])) ? $_data['netban_ipv4'] : $is_now['netban_ipv4']);
  166. $netban_ipv6 = intval((isset($_data['netban_ipv6'])) ? $_data['netban_ipv6'] : $is_now['netban_ipv6']);
  167. $wl = (isset($_data['whitelist'])) ? $_data['whitelist'] : $is_now['whitelist'];
  168. $bl = (isset($_data['blacklist'])) ? $_data['blacklist'] : $is_now['blacklist'];
  169. }
  170. else {
  171. $_SESSION['return'][] = array(
  172. 'type' => 'danger',
  173. 'log' => array(__FUNCTION__, $_action, $_data_log),
  174. 'msg' => 'access_denied'
  175. );
  176. return false;
  177. }
  178. $f2b_options = array();
  179. $f2b_options['ban_time'] = ($ban_time < 60) ? 60 : $ban_time;
  180. $f2b_options['netban_ipv4'] = ($netban_ipv4 < 8) ? 8 : $netban_ipv4;
  181. $f2b_options['netban_ipv6'] = ($netban_ipv6 < 8) ? 8 : $netban_ipv6;
  182. $f2b_options['netban_ipv4'] = ($netban_ipv4 > 32) ? 32 : $netban_ipv4;
  183. $f2b_options['netban_ipv6'] = ($netban_ipv6 > 128) ? 128 : $netban_ipv6;
  184. $f2b_options['max_attempts'] = ($max_attempts < 1) ? 1 : $max_attempts;
  185. $f2b_options['retry_window'] = ($retry_window < 1) ? 1 : $retry_window;
  186. try {
  187. $redis->Set('F2B_OPTIONS', json_encode($f2b_options));
  188. $redis->Del('F2B_WHITELIST');
  189. $redis->Del('F2B_BLACKLIST');
  190. if(!empty($wl)) {
  191. $wl_array = array_map('trim', preg_split( "/( |,|;|\n)/", $wl));
  192. if (is_array($wl_array)) {
  193. foreach ($wl_array as $wl_item) {
  194. if (valid_network($wl_item) || valid_hostname($wl_item)) {
  195. $redis->hSet('F2B_WHITELIST', $wl_item, 1);
  196. }
  197. }
  198. }
  199. }
  200. if(!empty($bl)) {
  201. $bl_array = array_map('trim', preg_split( "/( |,|;|\n)/", $bl));
  202. if (is_array($bl_array)) {
  203. foreach ($bl_array as $bl_item) {
  204. if (valid_network($bl_item) || valid_hostname($bl_item)) {
  205. $redis->hSet('F2B_BLACKLIST', $bl_item, 1);
  206. }
  207. }
  208. }
  209. }
  210. }
  211. catch (RedisException $e) {
  212. $_SESSION['return'][] = array(
  213. 'type' => 'danger',
  214. 'log' => array(__FUNCTION__, $_action, $_data_log),
  215. 'msg' => array('redis_error', $e)
  216. );
  217. return false;
  218. }
  219. $_SESSION['return'][] = array(
  220. 'type' => 'success',
  221. 'log' => array(__FUNCTION__, $_action, $_data_log),
  222. 'msg' => 'f2b_modified'
  223. );
  224. break;
  225. }
  226. }