functions.fail2ban.inc.php 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332
  1. <?php
  2. function fail2ban($_action, $_data = null) {
  3. global $redis;
  4. $_data_log = $_data;
  5. switch ($_action) {
  6. case 'get':
  7. $f2b_options = array();
  8. if ($_SESSION['mailcow_cc_role'] != "admin") {
  9. return false;
  10. }
  11. try {
  12. $f2b_options = json_decode($redis->Get('F2B_OPTIONS'), true);
  13. $f2b_options['regex'] = json_decode($redis->Get('F2B_REGEX'), true);
  14. $wl = $redis->hGetAll('F2B_WHITELIST');
  15. if (is_array($wl)) {
  16. foreach ($wl as $key => $value) {
  17. $tmp_wl_data[] = $key;
  18. }
  19. if (isset($tmp_wl_data)) {
  20. natsort($tmp_wl_data);
  21. $f2b_options['whitelist'] = implode(PHP_EOL, $tmp_wl_data);
  22. }
  23. else {
  24. $f2b_options['whitelist'] = "";
  25. }
  26. }
  27. else {
  28. $f2b_options['whitelist'] = "";
  29. }
  30. $bl = $redis->hGetAll('F2B_BLACKLIST');
  31. if (is_array($bl)) {
  32. foreach ($bl as $key => $value) {
  33. $tmp_bl_data[] = $key;
  34. }
  35. if (isset($tmp_bl_data)) {
  36. natsort($tmp_bl_data);
  37. $f2b_options['blacklist'] = implode(PHP_EOL, $tmp_bl_data);
  38. }
  39. else {
  40. $f2b_options['blacklist'] = "";
  41. }
  42. }
  43. else {
  44. $f2b_options['blacklist'] = "";
  45. }
  46. $pb = $redis->hGetAll('F2B_PERM_BANS');
  47. if (is_array($pb)) {
  48. foreach ($pb as $key => $value) {
  49. $f2b_options['perm_bans'][] = $key;
  50. }
  51. }
  52. else {
  53. $f2b_options['perm_bans'] = "";
  54. }
  55. $active_bans = $redis->hGetAll('F2B_ACTIVE_BANS');
  56. $queue_unban = $redis->hGetAll('F2B_QUEUE_UNBAN');
  57. if (is_array($active_bans)) {
  58. foreach ($active_bans as $network => $banned_until) {
  59. $queued_for_unban = (isset($queue_unban[$network]) && $queue_unban[$network] == 1) ? 1 : 0;
  60. $difference = $banned_until - time();
  61. $f2b_options['active_bans'][] = array(
  62. 'queued_for_unban' => $queued_for_unban,
  63. 'network' => $network,
  64. 'banned_until' => sprintf('%02dh %02dm %02ds', ($difference/3600), ($difference/60%60), $difference%60)
  65. );
  66. }
  67. }
  68. else {
  69. $f2b_options['active_bans'] = "";
  70. }
  71. }
  72. catch (RedisException $e) {
  73. $_SESSION['return'][] = array(
  74. 'type' => 'danger',
  75. 'log' => array(__FUNCTION__, $_action, $_data_log),
  76. 'msg' => array('redis_error', $e)
  77. );
  78. return false;
  79. }
  80. return $f2b_options;
  81. break;
  82. case 'edit':
  83. if ($_SESSION['mailcow_cc_role'] != "admin") {
  84. $_SESSION['return'][] = array(
  85. 'type' => 'danger',
  86. 'log' => array(__FUNCTION__, $_action, $_data_log),
  87. 'msg' => 'access_denied'
  88. );
  89. return false;
  90. }
  91. // Start to read actions, if any
  92. if (isset($_data['action'])) {
  93. // Reset regex filters
  94. if ($_data['action'] == "reset-regex") {
  95. try {
  96. $redis->Del('F2B_REGEX');
  97. }
  98. catch (RedisException $e) {
  99. $_SESSION['return'][] = array(
  100. 'type' => 'danger',
  101. 'log' => array(__FUNCTION__, $_action, $_data_log),
  102. 'msg' => array('redis_error', $e)
  103. );
  104. return false;
  105. }
  106. // Rules will also be recreated on log events, but rules may seem empty for a second in the UI
  107. docker('post', 'netfilter-mailcow', 'restart');
  108. $fail_count = 0;
  109. $regex_result = json_decode($redis->Get('F2B_REGEX'), true);
  110. while (empty($regex_result) && $fail_count < 10) {
  111. $regex_result = json_decode($redis->Get('F2B_REGEX'), true);
  112. $fail_count++;
  113. sleep(1);
  114. }
  115. if ($fail_count >= 10) {
  116. $_SESSION['return'][] = array(
  117. 'type' => 'danger',
  118. 'log' => array(__FUNCTION__, $_action, $_data_log),
  119. 'msg' => array('reset_f2b_regex')
  120. );
  121. return false;
  122. }
  123. }
  124. elseif ($_data['action'] == "edit-regex") {
  125. if (!empty($_data['regex'])) {
  126. $rule_id = 1;
  127. $regex_array = array();
  128. foreach($_data['regex'] as $regex) {
  129. $regex_array[$rule_id] = $regex;
  130. $rule_id++;
  131. }
  132. if (!empty($regex_array)) {
  133. $redis->Set('F2B_REGEX', json_encode($regex_array, JSON_UNESCAPED_SLASHES));
  134. }
  135. }
  136. else {
  137. $_SESSION['return'][] = array(
  138. 'type' => 'success',
  139. 'log' => array(__FUNCTION__, $_action, $_data_log),
  140. 'msg' => print_r($_data, true)
  141. );
  142. return false;
  143. }
  144. $_SESSION['return'][] = array(
  145. 'type' => 'success',
  146. 'log' => array(__FUNCTION__, $_action, $_data_log),
  147. 'msg' => array('object_modified', htmlspecialchars($network))
  148. );
  149. return true;
  150. }
  151. // Start actions in dependency of network
  152. if (!empty($_data['network'])) {
  153. $networks = (array)$_data['network'];
  154. foreach ($networks as $network) {
  155. // Unban network
  156. if ($_data['action'] == "unban") {
  157. if (valid_network($network)) {
  158. try {
  159. $redis->hSet('F2B_QUEUE_UNBAN', $network, 1);
  160. }
  161. catch (RedisException $e) {
  162. $_SESSION['return'][] = array(
  163. 'type' => 'danger',
  164. 'log' => array(__FUNCTION__, $_action, $_data_log),
  165. 'msg' => array('redis_error', $e)
  166. );
  167. continue;
  168. }
  169. }
  170. }
  171. // Whitelist network
  172. elseif ($_data['action'] == "whitelist") {
  173. if (empty($network)) { continue; }
  174. if (valid_network($network)) {
  175. try {
  176. $redis->hSet('F2B_WHITELIST', $network, 1);
  177. $redis->hDel('F2B_BLACKLIST', $network, 1);
  178. $redis->hSet('F2B_QUEUE_UNBAN', $network, 1);
  179. }
  180. catch (RedisException $e) {
  181. $_SESSION['return'][] = array(
  182. 'type' => 'danger',
  183. 'log' => array(__FUNCTION__, $_action, $_data_log),
  184. 'msg' => array('redis_error', $e)
  185. );
  186. continue;
  187. }
  188. }
  189. else {
  190. $_SESSION['return'][] = array(
  191. 'type' => 'danger',
  192. 'log' => array(__FUNCTION__, $_action, $_data_log),
  193. 'msg' => array('network_host_invalid', $network)
  194. );
  195. continue;
  196. }
  197. }
  198. // Blacklist network
  199. elseif ($_data['action'] == "blacklist") {
  200. if (empty($network)) { continue; }
  201. if (valid_network($network) && !in_array($network, array(
  202. '0.0.0.0',
  203. '0.0.0.0/0',
  204. getenv('IPV4_NETWORK') . '0/24',
  205. getenv('IPV4_NETWORK') . '0',
  206. getenv('IPV6_NETWORK')
  207. ))) {
  208. try {
  209. $redis->hSet('F2B_BLACKLIST', $network, 1);
  210. $redis->hDel('F2B_WHITELIST', $network, 1);
  211. //$response = docker('post', 'netfilter-mailcow', 'restart');
  212. }
  213. catch (RedisException $e) {
  214. $_SESSION['return'][] = array(
  215. 'type' => 'danger',
  216. 'log' => array(__FUNCTION__, $_action, $_data_log),
  217. 'msg' => array('redis_error', $e)
  218. );
  219. continue;
  220. }
  221. }
  222. else {
  223. $_SESSION['return'][] = array(
  224. 'type' => 'danger',
  225. 'log' => array(__FUNCTION__, $_action, $_data_log),
  226. 'msg' => array('network_host_invalid', $network)
  227. );
  228. continue;
  229. }
  230. }
  231. $_SESSION['return'][] = array(
  232. 'type' => 'success',
  233. 'log' => array(__FUNCTION__, $_action, $_data_log),
  234. 'msg' => array('object_modified', htmlspecialchars($network))
  235. );
  236. }
  237. return true;
  238. }
  239. }
  240. // Start default edit without specific action
  241. $is_now = fail2ban('get');
  242. if (!empty($is_now)) {
  243. $ban_time = intval((isset($_data['ban_time'])) ? $_data['ban_time'] : $is_now['ban_time']);
  244. $max_attempts = intval((isset($_data['max_attempts'])) ? $_data['max_attempts'] : $is_now['max_attempts']);
  245. $retry_window = intval((isset($_data['retry_window'])) ? $_data['retry_window'] : $is_now['retry_window']);
  246. $netban_ipv4 = intval((isset($_data['netban_ipv4'])) ? $_data['netban_ipv4'] : $is_now['netban_ipv4']);
  247. $netban_ipv6 = intval((isset($_data['netban_ipv6'])) ? $_data['netban_ipv6'] : $is_now['netban_ipv6']);
  248. $wl = (isset($_data['whitelist'])) ? $_data['whitelist'] : $is_now['whitelist'];
  249. $bl = (isset($_data['blacklist'])) ? $_data['blacklist'] : $is_now['blacklist'];
  250. }
  251. else {
  252. $_SESSION['return'][] = array(
  253. 'type' => 'danger',
  254. 'log' => array(__FUNCTION__, $_action, $_data_log),
  255. 'msg' => 'access_denied'
  256. );
  257. return false;
  258. }
  259. $f2b_options = array();
  260. $f2b_options['ban_time'] = ($ban_time < 60) ? 60 : $ban_time;
  261. $f2b_options['netban_ipv4'] = ($netban_ipv4 < 8) ? 8 : $netban_ipv4;
  262. $f2b_options['netban_ipv6'] = ($netban_ipv6 < 8) ? 8 : $netban_ipv6;
  263. $f2b_options['netban_ipv4'] = ($netban_ipv4 > 32) ? 32 : $netban_ipv4;
  264. $f2b_options['netban_ipv6'] = ($netban_ipv6 > 128) ? 128 : $netban_ipv6;
  265. $f2b_options['max_attempts'] = ($max_attempts < 1) ? 1 : $max_attempts;
  266. $f2b_options['retry_window'] = ($retry_window < 1) ? 1 : $retry_window;
  267. try {
  268. $redis->Set('F2B_OPTIONS', json_encode($f2b_options));
  269. $redis->Del('F2B_WHITELIST');
  270. $redis->Del('F2B_BLACKLIST');
  271. if(!empty($wl)) {
  272. $wl_array = array_map('trim', preg_split( "/( |,|;|\n)/", $wl));
  273. $wl_array = array_filter($wl_array);
  274. if (is_array($wl_array)) {
  275. foreach ($wl_array as $wl_item) {
  276. if (valid_network($wl_item) || valid_hostname($wl_item)) {
  277. $redis->hSet('F2B_WHITELIST', $wl_item, 1);
  278. }
  279. else {
  280. $_SESSION['return'][] = array(
  281. 'type' => 'danger',
  282. 'log' => array(__FUNCTION__, $_action, $_data_log),
  283. 'msg' => array('network_host_invalid', $wl_item)
  284. );
  285. continue;
  286. }
  287. }
  288. }
  289. }
  290. if(!empty($bl)) {
  291. $bl_array = array_map('trim', preg_split( "/( |,|;|\n)/", $bl));
  292. $bl_array = array_filter($bl_array);
  293. if (is_array($bl_array)) {
  294. foreach ($bl_array as $bl_item) {
  295. if (valid_network($bl_item) && !in_array($bl_item, array(
  296. '0.0.0.0',
  297. '0.0.0.0/0',
  298. getenv('IPV4_NETWORK') . '0/24',
  299. getenv('IPV4_NETWORK') . '0',
  300. getenv('IPV6_NETWORK')
  301. ))) {
  302. $redis->hSet('F2B_BLACKLIST', $bl_item, 1);
  303. }
  304. else {
  305. $_SESSION['return'][] = array(
  306. 'type' => 'danger',
  307. 'log' => array(__FUNCTION__, $_action, $_data_log),
  308. 'msg' => array('network_host_invalid', $bl_item)
  309. );
  310. continue;
  311. }
  312. }
  313. }
  314. }
  315. }
  316. catch (RedisException $e) {
  317. $_SESSION['return'][] = array(
  318. 'type' => 'danger',
  319. 'log' => array(__FUNCTION__, $_action, $_data_log),
  320. 'msg' => array('redis_error', $e)
  321. );
  322. return false;
  323. }
  324. $_SESSION['return'][] = array(
  325. 'type' => 'success',
  326. 'log' => array(__FUNCTION__, $_action, $_data_log),
  327. 'msg' => 'f2b_modified'
  328. );
  329. break;
  330. }
  331. }