functions.fail2ban.inc.php 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403
  1. <?php
  2. function fail2ban($_action, $_data = null, $_extra = null) {
  3. global $redis;
  4. $_data_log = $_data;
  5. switch ($_action) {
  6. case 'get':
  7. $f2b_options = array();
  8. if ($_SESSION['mailcow_cc_role'] != "admin") {
  9. return false;
  10. }
  11. try {
  12. $f2b_options = json_decode($redis->Get('F2B_OPTIONS'), true);
  13. $f2b_options['regex'] = json_decode($redis->Get('F2B_REGEX'), true);
  14. $wl = $redis->hGetAll('F2B_WHITELIST');
  15. if (is_array($wl)) {
  16. foreach ($wl as $key => $value) {
  17. $tmp_wl_data[] = $key;
  18. }
  19. if (isset($tmp_wl_data)) {
  20. natsort($tmp_wl_data);
  21. $f2b_options['whitelist'] = implode(PHP_EOL, (array)$tmp_wl_data);
  22. }
  23. else {
  24. $f2b_options['whitelist'] = "";
  25. }
  26. }
  27. else {
  28. $f2b_options['whitelist'] = "";
  29. }
  30. $bl = $redis->hGetAll('F2B_BLACKLIST');
  31. if (is_array($bl)) {
  32. foreach ($bl as $key => $value) {
  33. $tmp_bl_data[] = $key;
  34. }
  35. if (isset($tmp_bl_data)) {
  36. natsort($tmp_bl_data);
  37. $f2b_options['blacklist'] = implode(PHP_EOL, (array)$tmp_bl_data);
  38. }
  39. else {
  40. $f2b_options['blacklist'] = "";
  41. }
  42. }
  43. else {
  44. $f2b_options['blacklist'] = "";
  45. }
  46. $pb = $redis->hGetAll('F2B_PERM_BANS');
  47. if (is_array($pb)) {
  48. foreach ($pb as $key => $value) {
  49. $f2b_options['perm_bans'][] = array(
  50. 'network'=>$key,
  51. 'ip' => strtok($key,'/')
  52. );
  53. }
  54. }
  55. else {
  56. $f2b_options['perm_bans'] = "";
  57. }
  58. $active_bans = $redis->hGetAll('F2B_ACTIVE_BANS');
  59. $queue_unban = $redis->hGetAll('F2B_QUEUE_UNBAN');
  60. if (is_array($active_bans)) {
  61. foreach ($active_bans as $network => $banned_until) {
  62. $queued_for_unban = (isset($queue_unban[$network]) && $queue_unban[$network] == 1) ? 1 : 0;
  63. $difference = $banned_until - time();
  64. $f2b_options['active_bans'][] = array(
  65. 'queued_for_unban' => $queued_for_unban,
  66. 'network' => $network,
  67. 'ip' => strtok($network,'/'),
  68. 'banned_until' => sprintf('%02dh %02dm %02ds', ($difference/3600), ($difference/60%60), $difference%60)
  69. );
  70. }
  71. }
  72. else {
  73. $f2b_options['active_bans'] = "";
  74. }
  75. }
  76. catch (RedisException $e) {
  77. $_SESSION['return'][] = array(
  78. 'type' => 'danger',
  79. 'log' => array(__FUNCTION__, $_action, $_data_log),
  80. 'msg' => array('redis_error', $e)
  81. );
  82. return false;
  83. }
  84. return $f2b_options;
  85. break;
  86. case 'edit':
  87. if ($_SESSION['mailcow_cc_role'] != "admin") {
  88. $_SESSION['return'][] = array(
  89. 'type' => 'danger',
  90. 'log' => array(__FUNCTION__, $_action, $_data_log),
  91. 'msg' => 'access_denied'
  92. );
  93. return false;
  94. }
  95. // Start to read actions, if any
  96. if (isset($_data['action'])) {
  97. // Reset regex filters
  98. if ($_data['action'] == "reset-regex") {
  99. try {
  100. $redis->Del('F2B_REGEX');
  101. }
  102. catch (RedisException $e) {
  103. $_SESSION['return'][] = array(
  104. 'type' => 'danger',
  105. 'log' => array(__FUNCTION__, $_action, $_data_log),
  106. 'msg' => array('redis_error', $e)
  107. );
  108. return false;
  109. }
  110. // Rules will also be recreated on log events, but rules may seem empty for a second in the UI
  111. docker('post', 'netfilter-mailcow', 'restart');
  112. $fail_count = 0;
  113. $regex_result = json_decode($redis->Get('F2B_REGEX'), true);
  114. while (empty($regex_result) && $fail_count < 10) {
  115. $regex_result = json_decode($redis->Get('F2B_REGEX'), true);
  116. $fail_count++;
  117. sleep(1);
  118. }
  119. if ($fail_count >= 10) {
  120. $_SESSION['return'][] = array(
  121. 'type' => 'danger',
  122. 'log' => array(__FUNCTION__, $_action, $_data_log),
  123. 'msg' => array('reset_f2b_regex')
  124. );
  125. return false;
  126. }
  127. }
  128. elseif ($_data['action'] == "edit-regex") {
  129. if (!empty($_data['regex'])) {
  130. $rule_id = 1;
  131. $regex_array = array();
  132. foreach($_data['regex'] as $regex) {
  133. $regex_array[$rule_id] = $regex;
  134. $rule_id++;
  135. }
  136. if (!empty($regex_array)) {
  137. $redis->Set('F2B_REGEX', json_encode($regex_array, JSON_UNESCAPED_SLASHES));
  138. }
  139. }
  140. $_SESSION['return'][] = array(
  141. 'type' => 'success',
  142. 'log' => array(__FUNCTION__, $_action, $_data_log),
  143. 'msg' => array('object_modified', htmlspecialchars($network))
  144. );
  145. return true;
  146. }
  147. // Start actions in dependency of network
  148. if (!empty($_data['network'])) {
  149. $networks = (array)$_data['network'];
  150. foreach ($networks as $network) {
  151. // Unban network
  152. if ($_data['action'] == "unban") {
  153. if (valid_network($network)) {
  154. try {
  155. $redis->hSet('F2B_QUEUE_UNBAN', $network, 1);
  156. }
  157. catch (RedisException $e) {
  158. $_SESSION['return'][] = array(
  159. 'type' => 'danger',
  160. 'log' => array(__FUNCTION__, $_action, $_data_log),
  161. 'msg' => array('redis_error', $e)
  162. );
  163. continue;
  164. }
  165. }
  166. }
  167. // Whitelist network
  168. elseif ($_data['action'] == "whitelist") {
  169. if (empty($network)) { continue; }
  170. if (valid_network($network)) {
  171. try {
  172. $redis->hSet('F2B_WHITELIST', $network, 1);
  173. $redis->hDel('F2B_BLACKLIST', $network, 1);
  174. $redis->hSet('F2B_QUEUE_UNBAN', $network, 1);
  175. }
  176. catch (RedisException $e) {
  177. $_SESSION['return'][] = array(
  178. 'type' => 'danger',
  179. 'log' => array(__FUNCTION__, $_action, $_data_log),
  180. 'msg' => array('redis_error', $e)
  181. );
  182. continue;
  183. }
  184. }
  185. else {
  186. $_SESSION['return'][] = array(
  187. 'type' => 'danger',
  188. 'log' => array(__FUNCTION__, $_action, $_data_log),
  189. 'msg' => array('network_host_invalid', $network)
  190. );
  191. continue;
  192. }
  193. }
  194. // Blacklist network
  195. elseif ($_data['action'] == "blacklist") {
  196. if (empty($network)) { continue; }
  197. if (valid_network($network) && !in_array($network, array(
  198. '0.0.0.0',
  199. '0.0.0.0/0',
  200. getenv('IPV4_NETWORK') . '0/24',
  201. getenv('IPV4_NETWORK') . '0',
  202. getenv('IPV6_NETWORK')
  203. ))) {
  204. try {
  205. $redis->hSet('F2B_BLACKLIST', $network, 1);
  206. $redis->hDel('F2B_WHITELIST', $network, 1);
  207. //$response = docker('post', 'netfilter-mailcow', 'restart');
  208. }
  209. catch (RedisException $e) {
  210. $_SESSION['return'][] = array(
  211. 'type' => 'danger',
  212. 'log' => array(__FUNCTION__, $_action, $_data_log),
  213. 'msg' => array('redis_error', $e)
  214. );
  215. continue;
  216. }
  217. }
  218. else {
  219. $_SESSION['return'][] = array(
  220. 'type' => 'danger',
  221. 'log' => array(__FUNCTION__, $_action, $_data_log),
  222. 'msg' => array('network_host_invalid', $network)
  223. );
  224. continue;
  225. }
  226. }
  227. $_SESSION['return'][] = array(
  228. 'type' => 'success',
  229. 'log' => array(__FUNCTION__, $_action, $_data_log),
  230. 'msg' => array('object_modified', htmlspecialchars($network))
  231. );
  232. }
  233. return true;
  234. }
  235. }
  236. // Start default edit without specific action
  237. $is_now = fail2ban('get');
  238. if (!empty($is_now)) {
  239. $ban_time = intval((isset($_data['ban_time'])) ? $_data['ban_time'] : $is_now['ban_time']);
  240. $ban_time_increment = (isset($_data['ban_time_increment']) && $_data['ban_time_increment'] == "1") ? 1 : 0;
  241. $max_attempts = intval((isset($_data['max_attempts'])) ? $_data['max_attempts'] : $is_now['max_attempts']);
  242. $max_ban_time = intval((isset($_data['max_ban_time'])) ? $_data['max_ban_time'] : $is_now['max_ban_time']);
  243. $retry_window = intval((isset($_data['retry_window'])) ? $_data['retry_window'] : $is_now['retry_window']);
  244. $netban_ipv4 = intval((isset($_data['netban_ipv4'])) ? $_data['netban_ipv4'] : $is_now['netban_ipv4']);
  245. $netban_ipv6 = intval((isset($_data['netban_ipv6'])) ? $_data['netban_ipv6'] : $is_now['netban_ipv6']);
  246. $wl = (isset($_data['whitelist'])) ? $_data['whitelist'] : $is_now['whitelist'];
  247. $bl = (isset($_data['blacklist'])) ? $_data['blacklist'] : $is_now['blacklist'];
  248. $manage_external = (isset($_data['manage_external'])) ? intval($_data['manage_external']) : 0;
  249. }
  250. else {
  251. $_SESSION['return'][] = array(
  252. 'type' => 'danger',
  253. 'log' => array(__FUNCTION__, $_action, $_data_log),
  254. 'msg' => 'access_denied'
  255. );
  256. return false;
  257. }
  258. $f2b_options = array();
  259. $f2b_options['ban_time'] = ($ban_time < 60) ? 60 : $ban_time;
  260. $f2b_options['ban_time_increment'] = ($ban_time_increment == 1) ? true : false;
  261. $f2b_options['max_ban_time'] = ($max_ban_time < 60) ? 60 : $max_ban_time;
  262. $f2b_options['netban_ipv4'] = ($netban_ipv4 < 8) ? 8 : $netban_ipv4;
  263. $f2b_options['netban_ipv6'] = ($netban_ipv6 < 8) ? 8 : $netban_ipv6;
  264. $f2b_options['netban_ipv4'] = ($netban_ipv4 > 32) ? 32 : $netban_ipv4;
  265. $f2b_options['netban_ipv6'] = ($netban_ipv6 > 128) ? 128 : $netban_ipv6;
  266. $f2b_options['max_attempts'] = ($max_attempts < 1) ? 1 : $max_attempts;
  267. $f2b_options['retry_window'] = ($retry_window < 1) ? 1 : $retry_window;
  268. $f2b_options['banlist_id'] = $is_now['banlist_id'];
  269. $f2b_options['manage_external'] = ($manage_external > 0) ? 1 : 0;
  270. try {
  271. $redis->Set('F2B_OPTIONS', json_encode($f2b_options));
  272. $redis->Del('F2B_WHITELIST');
  273. $redis->Del('F2B_BLACKLIST');
  274. if(!empty($wl)) {
  275. $wl_array = array_map('trim', preg_split( "/( |,|;|\n)/", $wl));
  276. $wl_array = array_filter($wl_array);
  277. if (is_array($wl_array)) {
  278. foreach ($wl_array as $wl_item) {
  279. if (valid_network($wl_item) || valid_hostname($wl_item)) {
  280. $redis->hSet('F2B_WHITELIST', $wl_item, 1);
  281. }
  282. else {
  283. $_SESSION['return'][] = array(
  284. 'type' => 'danger',
  285. 'log' => array(__FUNCTION__, $_action, $_data_log),
  286. 'msg' => array('network_host_invalid', $wl_item)
  287. );
  288. continue;
  289. }
  290. }
  291. }
  292. }
  293. if(!empty($bl)) {
  294. $bl_array = array_map('trim', preg_split( "/( |,|;|\n)/", $bl));
  295. $bl_array = array_filter($bl_array);
  296. if (is_array($bl_array)) {
  297. foreach ($bl_array as $bl_item) {
  298. if (valid_network($bl_item) && !in_array($bl_item, array(
  299. '0.0.0.0',
  300. '0.0.0.0/0',
  301. getenv('IPV4_NETWORK') . '0/24',
  302. getenv('IPV4_NETWORK') . '0',
  303. getenv('IPV6_NETWORK')
  304. ))) {
  305. $redis->hSet('F2B_BLACKLIST', $bl_item, 1);
  306. }
  307. else {
  308. $_SESSION['return'][] = array(
  309. 'type' => 'danger',
  310. 'log' => array(__FUNCTION__, $_action, $_data_log),
  311. 'msg' => array('network_host_invalid', $bl_item)
  312. );
  313. continue;
  314. }
  315. }
  316. }
  317. }
  318. }
  319. catch (RedisException $e) {
  320. $_SESSION['return'][] = array(
  321. 'type' => 'danger',
  322. 'log' => array(__FUNCTION__, $_action, $_data_log),
  323. 'msg' => array('redis_error', $e)
  324. );
  325. return false;
  326. }
  327. $_SESSION['return'][] = array(
  328. 'type' => 'success',
  329. 'log' => array(__FUNCTION__, $_action, $_data_log),
  330. 'msg' => 'f2b_modified'
  331. );
  332. break;
  333. case 'banlist':
  334. try {
  335. $f2b_options = json_decode($redis->Get('F2B_OPTIONS'), true);
  336. }
  337. catch (RedisException $e) {
  338. $_SESSION['return'][] = array(
  339. 'type' => 'danger',
  340. 'log' => array(__FUNCTION__, $_action, $_data_log, $_extra),
  341. 'msg' => array('redis_error', $e)
  342. );
  343. http_response_code(500);
  344. return false;
  345. }
  346. if (is_array($_extra)) {
  347. $_extra = $_extra[0];
  348. }
  349. if ($_extra != $f2b_options['banlist_id']){
  350. http_response_code(404);
  351. return false;
  352. }
  353. switch ($_data) {
  354. case 'get':
  355. try {
  356. $bl = $redis->hKeys('F2B_BLACKLIST');
  357. $active_bans = $redis->hKeys('F2B_ACTIVE_BANS');
  358. }
  359. catch (RedisException $e) {
  360. $_SESSION['return'][] = array(
  361. 'type' => 'danger',
  362. 'log' => array(__FUNCTION__, $_action, $_data_log, $_extra),
  363. 'msg' => array('redis_error', $e)
  364. );
  365. http_response_code(500);
  366. return false;
  367. }
  368. $banlist = implode("\n", array_merge($bl, $active_bans));
  369. return $banlist;
  370. break;
  371. case 'refresh':
  372. if ($_SESSION['mailcow_cc_role'] != "admin") {
  373. return false;
  374. }
  375. $f2b_options['banlist_id'] = uuid4();
  376. try {
  377. $redis->Set('F2B_OPTIONS', json_encode($f2b_options));
  378. }
  379. catch (RedisException $e) {
  380. $_SESSION['return'][] = array(
  381. 'type' => 'danger',
  382. 'log' => array(__FUNCTION__, $_action, $_data_log, $_extra),
  383. 'msg' => array('redis_error', $e)
  384. );
  385. return false;
  386. }
  387. $_SESSION['return'][] = array(
  388. 'type' => 'success',
  389. 'log' => array(__FUNCTION__, $_action, $_data_log, $_extra),
  390. 'msg' => 'f2b_banlist_refreshed'
  391. );
  392. return true;
  393. break;
  394. }
  395. break;
  396. }
  397. }