@@ -13,7 +13,7 @@ |
||
| 13 | 13 | $err = NULL; |
| 14 | 14 | |
| 15 | 15 | if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE ) |
| 16 | - exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error); |
|
| 16 | + exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error); |
|
| 17 | 17 | |
| 18 | 18 | if (addtolist ($mysqli,$user,$_POST['value'],$tables["$typedesc"],$_POST['unit'],$_POST['quantity'],$_POST['reason'],$err)) |
| 19 | 19 | print 'OK '.$_POST["type"].' <'.$_POST['value'].'> first time listed for '.$_POST['quantity'].$_POST['unit'].'.'; |
@@ -10,7 +10,7 @@ |
||
| 10 | 10 | $user = username(); |
| 11 | 11 | |
| 12 | 12 | if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE ) |
| 13 | - exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error); |
|
| 13 | + exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error); |
|
| 14 | 14 | if (remove ($mysqli,$user,$_POST['value'],$type,$table)) |
| 15 | 15 | print 'OK '.$typedesc.' <'.$_POST['value'].'> permanently REMOVED!'; |
| 16 | 16 | else |
@@ -12,7 +12,7 @@ |
||
| 12 | 12 | $user = username(); |
| 13 | 13 | |
| 14 | 14 | if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE ) |
| 15 | - exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error); |
|
| 15 | + exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error); |
|
| 16 | 16 | |
| 17 | 17 | if (changestatus($mysqli,username(),$_POST['value'],'0',$type,$table)) |
| 18 | 18 | print 'OK '.$_POST["type"].' <'.$_POST['value'].'> delisted.'; |
@@ -26,17 +26,17 @@ discard block |
||
| 26 | 26 | |
| 27 | 27 | /* Conf */ |
| 28 | 28 | if (!isset($_GET['conf'])) { |
| 29 | - syslog(LOG_ALERT, |
|
| 30 | - sprintf('%s: you must insert the config file name as a GET parameter, such as %s?conf=listEmail.conf', |
|
| 31 | - $user, $_SERVER['SCRIPT_NAME']) ); |
|
| 32 | - exit(254); |
|
| 29 | + syslog(LOG_ALERT, |
|
| 30 | + sprintf('%s: you must insert the config file name as a GET parameter, such as %s?conf=listEmail.conf', |
|
| 31 | + $user, $_SERVER['SCRIPT_NAME']) ); |
|
| 32 | + exit(254); |
|
| 33 | 33 | } |
| 34 | 34 | $fileconf = $_GET['conf']; |
| 35 | 35 | if ( !file_exists(dirname(__FILE__) . '/../' . $fileconf) ) { |
| 36 | - syslog(LOG_ALERT, |
|
| 37 | - sprintf('%s: the configuration file <%s> doesn\'t exist.', |
|
| 38 | - $user, $fileconf )); |
|
| 39 | - exit(254); |
|
| 36 | + syslog(LOG_ALERT, |
|
| 37 | + sprintf('%s: the configuration file <%s> doesn\'t exist.', |
|
| 38 | + $user, $fileconf )); |
|
| 39 | + exit(254); |
|
| 40 | 40 | } |
| 41 | 41 | |
| 42 | 42 | closelog(); |
@@ -64,8 +64,8 @@ discard block |
||
| 64 | 64 | |
| 65 | 65 | /* check you select a blocklist */ |
| 66 | 66 | if ( !$tables["$typedesc"]['bl'] ) { |
| 67 | - syslog(LOG_EMERG,"$user: <$typedesc> is not a blocklist. Are you stupid? Do you want to whitelist a spammer? I refuse to continue."); |
|
| 68 | - exit (254); |
|
| 67 | + syslog(LOG_EMERG,"$user: <$typedesc> is not a blocklist. Are you stupid? Do you want to whitelist a spammer? I refuse to continue."); |
|
| 68 | + exit (254); |
|
| 69 | 69 | } |
| 70 | 70 | |
| 71 | 71 | |
@@ -95,15 +95,15 @@ discard block |
||
| 95 | 95 | if (preg_match_all('/^https?\:\/\/(?<splunkhost>[\w\.\-]+)\:8000\/app\/(?<splunkapp>[\w\.\-]+)\/\@go\?sid=(?<job>[\w\.\-\d]+)$/', |
| 96 | 96 | $webhook['results_link'], $out, PREG_PATTERN_ORDER) === FALSE) { |
| 97 | 97 | syslog(LOG_ALERT, |
| 98 | - sprintf('%s: unexpected error: can\'t parse the results link returned by webhook (<%s>).', |
|
| 98 | + sprintf('%s: unexpected error: can\'t parse the results link returned by webhook (<%s>).', |
|
| 99 | 99 | $user, $webhook['results_link']) ); |
| 100 | 100 | return 255; |
| 101 | 101 | } |
| 102 | 102 | |
| 103 | 103 | if ( $webhook['app'] != $out['splunkapp'][0] ) { |
| 104 | 104 | syslog(LOG_ALERT, |
| 105 | - sprintf('%s: unexpected error: the APP returned by webhook (<%s>) doesn\'t match the app (<%s>) in result link.', |
|
| 106 | - $user, $webhook['app'], $out['splunkapp'][0] ) ); |
|
| 105 | + sprintf('%s: unexpected error: the APP returned by webhook (<%s>) doesn\'t match the app (<%s>) in result link.', |
|
| 106 | + $user, $webhook['app'], $out['splunkapp'][0] ) ); |
|
| 107 | 107 | return 255; |
| 108 | 108 | } |
| 109 | 109 | |
@@ -137,14 +137,14 @@ discard block |
||
| 137 | 137 | |
| 138 | 138 | $nr = count ($results); |
| 139 | 139 | for ($i=1; $i<$nr; $i++) { /* We skip first header line (i=0) */ |
| 140 | - $data = str_getcsv($results[$i], ','); |
|
| 141 | - $thisVal = $data[1]; |
|
| 142 | - unset($data[1]); |
|
| 143 | - $data = array_values($data); |
|
| 144 | - if ( !in_array($thisVal,array_keys($tolist)) ) |
|
| 145 | - $tolist["$thisVal"] = $data; |
|
| 146 | - else if ($data[3]>$tolist[$thisVal][3]) |
|
| 147 | - $tolist["$thisVal"] = $data; |
|
| 140 | + $data = str_getcsv($results[$i], ','); |
|
| 141 | + $thisVal = $data[1]; |
|
| 142 | + unset($data[1]); |
|
| 143 | + $data = array_values($data); |
|
| 144 | + if ( !in_array($thisVal,array_keys($tolist)) ) |
|
| 145 | + $tolist["$thisVal"] = $data; |
|
| 146 | + else if ($data[3]>$tolist[$thisVal][3]) |
|
| 147 | + $tolist["$thisVal"] = $data; |
|
| 148 | 148 | } |
| 149 | 149 | |
| 150 | 150 | /* Make MYSQL connection */ |
@@ -154,34 +154,34 @@ discard block |
||
| 154 | 154 | exit (254); |
| 155 | 155 | |
| 156 | 156 | foreach ( array_keys($tolist) as $value) { |
| 157 | - $quantity = $conf['quantity']; |
|
| 158 | - $reason = 'On ['.$tolist["$value"][0]."] <$value> sent ".$tolist["$value"][1].' messages to '.$tolist["$value"][2].' recipients.'; |
|
| 159 | - if ( $tolist["$value"][3] >= $threshold ) { |
|
| 160 | - if ( searchAndList ($mysqli,$user,$tables,$typedesc,$value,$unit,$quantity,$reason) ) { |
|
| 161 | - syslog (LOG_INFO, "$user: ".'Listing reason: '.$reason); |
|
| 162 | - /* Send a email to domain admin if you list an email */ |
|
| 163 | - if ( ( $tables["$typedesc"]['field'] == 'email' ) OR ( $tables["$typedesc"]['field'] == 'username' ) ) { |
|
| 164 | - /* Sometime uid are in the form of <user>@<domain> ... */ |
|
| 165 | - if ( strpos($value, '@') !== FALSE ) { |
|
| 166 | - $domain = substr(strrchr($value, '@'), 1); |
|
| 167 | - if ( strpos($domain, '@') === FALSE ) { |
|
| 168 | - $recip = emailToNotify($domainNotify_file,$domain); |
|
| 169 | - $subject = sprintf('%s <%s> is now blocked because exceedes limits on outgoing emails', |
|
| 170 | - $tables["$typedesc"]['field'], $value); |
|
| 171 | - if (!empty($recip)) |
|
| 172 | - if ( sendEmailWarn($tplfile,'[email protected]',$recip, |
|
| 173 | - $subject,$value,"$quantity $unit",$reason) ) |
|
| 174 | - syslog(LOG_INFO, "$user: \"$recip\" was notified about the \"$value\" abuse."); |
|
| 175 | - } |
|
| 176 | - else syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent."); |
|
| 177 | - } |
|
| 178 | - } |
|
| 179 | - } |
|
| 180 | - } |
|
| 181 | - else { |
|
| 182 | - $reason .= " But it has NOT been listed because it doesn't apply to the trigger condition."; |
|
| 183 | - syslog (LOG_INFO, "$user: ".$reason); |
|
| 184 | - } |
|
| 157 | + $quantity = $conf['quantity']; |
|
| 158 | + $reason = 'On ['.$tolist["$value"][0]."] <$value> sent ".$tolist["$value"][1].' messages to '.$tolist["$value"][2].' recipients.'; |
|
| 159 | + if ( $tolist["$value"][3] >= $threshold ) { |
|
| 160 | + if ( searchAndList ($mysqli,$user,$tables,$typedesc,$value,$unit,$quantity,$reason) ) { |
|
| 161 | + syslog (LOG_INFO, "$user: ".'Listing reason: '.$reason); |
|
| 162 | + /* Send a email to domain admin if you list an email */ |
|
| 163 | + if ( ( $tables["$typedesc"]['field'] == 'email' ) OR ( $tables["$typedesc"]['field'] == 'username' ) ) { |
|
| 164 | + /* Sometime uid are in the form of <user>@<domain> ... */ |
|
| 165 | + if ( strpos($value, '@') !== FALSE ) { |
|
| 166 | + $domain = substr(strrchr($value, '@'), 1); |
|
| 167 | + if ( strpos($domain, '@') === FALSE ) { |
|
| 168 | + $recip = emailToNotify($domainNotify_file,$domain); |
|
| 169 | + $subject = sprintf('%s <%s> is now blocked because exceedes limits on outgoing emails', |
|
| 170 | + $tables["$typedesc"]['field'], $value); |
|
| 171 | + if (!empty($recip)) |
|
| 172 | + if ( sendEmailWarn($tplfile,'[email protected]',$recip, |
|
| 173 | + $subject,$value,"$quantity $unit",$reason) ) |
|
| 174 | + syslog(LOG_INFO, "$user: \"$recip\" was notified about the \"$value\" abuse."); |
|
| 175 | + } |
|
| 176 | + else syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent."); |
|
| 177 | + } |
|
| 178 | + } |
|
| 179 | + } |
|
| 180 | + } |
|
| 181 | + else { |
|
| 182 | + $reason .= " But it has NOT been listed because it doesn't apply to the trigger condition."; |
|
| 183 | + syslog (LOG_INFO, "$user: ".$reason); |
|
| 184 | + } |
|
| 185 | 185 | } |
| 186 | 186 | |
| 187 | 187 | /* Close connection */ |
@@ -4,8 +4,8 @@ discard block |
||
| 4 | 4 | |
| 5 | 5 | function username() { |
| 6 | 6 | if (isset ($_SERVER['REMOTE_USER'])) $user = $_SERVER['REMOTE_USER']; |
| 7 | - else if (isset ($_SERVER['USER'])) $user = $_SERVER['USER']; |
|
| 8 | - else $user='unknown'; |
|
| 7 | + else if (isset ($_SERVER['USER'])) $user = $_SERVER['USER']; |
|
| 8 | + else $user='unknown'; |
|
| 9 | 9 | return $user; |
| 10 | 10 | } |
| 11 | 11 | |
@@ -21,11 +21,11 @@ discard block |
||
| 21 | 21 | } |
| 22 | 22 | |
| 23 | 23 | function myConnect($host, $user, $pass, $db, $port, $tablelist, $typedesc, $loguser) { |
| 24 | - $db = ( $tablelist["$typedesc"]['milter'] ) ? $tablelist["$typedesc"]['name'] : $db; |
|
| 24 | + $db = ( $tablelist["$typedesc"]['milter'] ) ? $tablelist["$typedesc"]['name'] : $db; |
|
| 25 | 25 | $mysqli = new mysqli($host, $user, $pass, $db, $port); |
| 26 | - if ($mysqli->connect_error) { |
|
| 27 | - syslog (LOG_EMERG, $loguser.': Connect Error to DB <'.$db.'> (' . $mysqli->connect_errno . ') ' |
|
| 28 | - . $mysqli->connect_error); |
|
| 26 | + if ($mysqli->connect_error) { |
|
| 27 | + syslog (LOG_EMERG, $loguser.': Connect Error to DB <'.$db.'> (' . $mysqli->connect_errno . ') ' |
|
| 28 | + . $mysqli->connect_error); |
|
| 29 | 29 | return FALSE; |
| 30 | 30 | } |
| 31 | 31 | syslog(LOG_INFO, $loguser.': Successfully MySQL connected at DB <'.$db.'> to ' . $mysqli->host_info) ; |
@@ -66,7 +66,7 @@ discard block |
||
| 66 | 66 | } |
| 67 | 67 | } |
| 68 | 68 | list($sub['net'],$sub['mask'])=explode('/',$value); |
| 69 | - $query= sprintf("INSERT INTO `$table` ( |
|
| 69 | + $query= sprintf("INSERT INTO `$table` ( |
|
| 70 | 70 | `$type` , |
| 71 | 71 | `netmask`, |
| 72 | 72 | `date` , |
@@ -79,10 +79,10 @@ discard block |
||
| 79 | 79 | INET_ATON( '%s' ) , INET_ATON( '%s' ) , |
| 80 | 80 | CURRENT_TIMESTAMP , TIMESTAMPADD(%s,%d,CURRENT_TIMESTAMP), '1', '%s', '%s' |
| 81 | 81 | )" ,$sub['net'],$sub['mask'],$expUnit,$expQ,$user,$myreason); |
| 82 | - break; |
|
| 82 | + break; |
|
| 83 | 83 | |
| 84 | 84 | default: |
| 85 | - $query= sprintf("INSERT INTO `$table` ( |
|
| 85 | + $query= sprintf("INSERT INTO `$table` ( |
|
| 86 | 86 | `$type` , |
| 87 | 87 | `date` , |
| 88 | 88 | `exp` , |
@@ -97,8 +97,8 @@ discard block |
||
| 97 | 97 | } |
| 98 | 98 | |
| 99 | 99 | if ($myconn->query($query) === TRUE) { |
| 100 | - syslog(LOG_INFO, "$user: $type <$value> successfully listed on <$table> for $expQ $expUnit."); |
|
| 101 | - $result=TRUE; |
|
| 100 | + syslog(LOG_INFO, "$user: $type <$value> successfully listed on <$table> for $expQ $expUnit."); |
|
| 101 | + $result=TRUE; |
|
| 102 | 102 | } |
| 103 | 103 | else syslog(LOG_ERR, "$user: Error: ".$myconn->error); |
| 104 | 104 | return $result; |
@@ -116,9 +116,9 @@ discard block |
||
| 116 | 116 | $nlist = '`nlist` + 1'; |
| 117 | 117 | } |
| 118 | 118 | |
| 119 | - switch ($type) { |
|
| 119 | + switch ($type) { |
|
| 120 | 120 | case 'ip': |
| 121 | - $query= sprintf("UPDATE `$table` SET |
|
| 121 | + $query= sprintf("UPDATE `$table` SET |
|
| 122 | 122 | `active` = '1', |
| 123 | 123 | `user` = '%s', |
| 124 | 124 | `exp` = TIMESTAMPADD(%s,%d,%s), |
@@ -126,9 +126,9 @@ discard block |
||
| 126 | 126 | `reason` = '%s' |
| 127 | 127 | WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$value); |
| 128 | 128 | break; |
| 129 | - case 'network': |
|
| 129 | + case 'network': |
|
| 130 | 130 | list($sub['net'],$sub['mask'])=explode('/',$value); |
| 131 | - $query= sprintf("UPDATE `$table` SET |
|
| 131 | + $query= sprintf("UPDATE `$table` SET |
|
| 132 | 132 | `active` = '1', |
| 133 | 133 | `user` = '%s', |
| 134 | 134 | `exp` = TIMESTAMPADD(%s,%d,%s), |
@@ -137,7 +137,7 @@ discard block |
||
| 137 | 137 | WHERE (`$table`.`$type` = INET_ATON('%s') AND `$table`.`netmask` = INET_ATON('%s')) LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$sub['net'],$sub['mask']); |
| 138 | 138 | break; |
| 139 | 139 | default: |
| 140 | - $query= sprintf("UPDATE `$table` SET |
|
| 140 | + $query= sprintf("UPDATE `$table` SET |
|
| 141 | 141 | `active` = '1', |
| 142 | 142 | `user` = '%s', |
| 143 | 143 | `exp` = TIMESTAMPADD(%s,%d,%s), |
@@ -146,18 +146,18 @@ discard block |
||
| 146 | 146 | WHERE `$table`.`$type` = '%s' LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$value); |
| 147 | 147 | } |
| 148 | 148 | |
| 149 | - if ($myconn->query($query) === TRUE) { |
|
| 150 | - syslog(LOG_INFO, "$user: relist $type <$value> on <$table> for $expQ $expUnit from $exptime."); |
|
| 149 | + if ($myconn->query($query) === TRUE) { |
|
| 150 | + syslog(LOG_INFO, "$user: relist $type <$value> on <$table> for $expQ $expUnit from $exptime."); |
|
| 151 | 151 | $result=TRUE; |
| 152 | - } |
|
| 153 | - else syslog (LOG_ERR, "$user: Error: ". $myconn->error); |
|
| 152 | + } |
|
| 153 | + else syslog (LOG_ERR, "$user: Error: ". $myconn->error); |
|
| 154 | 154 | return $result; |
| 155 | 155 | } |
| 156 | 156 | |
| 157 | 157 | function remove ($myconn,$user,$value,$type,$table) { |
| 158 | 158 | |
| 159 | - switch ($type) { |
|
| 160 | - case 'ip': |
|
| 159 | + switch ($type) { |
|
| 160 | + case 'ip': |
|
| 161 | 161 | $query = sprintf("DELETE FROM `$table` WHERE |
| 162 | 162 | `$table`.`$type` = INET_ATON('%s') LIMIT 1", $value); |
| 163 | 163 | break; |
@@ -173,18 +173,18 @@ discard block |
||
| 173 | 173 | } |
| 174 | 174 | |
| 175 | 175 | |
| 176 | - if ($return=$myconn->query($query) === TRUE) |
|
| 177 | - syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>."); |
|
| 178 | - else syslog(LOG_ERR, "$user: Error: ". $myconn->error); |
|
| 176 | + if ($return=$myconn->query($query) === TRUE) |
|
| 177 | + syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>."); |
|
| 178 | + else syslog(LOG_ERR, "$user: Error: ". $myconn->error); |
|
| 179 | 179 | |
| 180 | - return $return; |
|
| 180 | + return $return; |
|
| 181 | 181 | } |
| 182 | 182 | |
| 183 | 183 | |
| 184 | 184 | function changestatus ($myconn,$user,$value,$status,$type,$table) { |
| 185 | 185 | |
| 186 | 186 | switch ($type) { |
| 187 | - case 'ip': |
|
| 187 | + case 'ip': |
|
| 188 | 188 | $query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1" ,$user, $value); |
| 189 | 189 | break; |
| 190 | 190 | case 'network': |
@@ -195,16 +195,16 @@ discard block |
||
| 195 | 195 | $query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = '%s' LIMIT 1" ,$user, $value); |
| 196 | 196 | } |
| 197 | 197 | |
| 198 | - if ($return=$myconn->query($query) === TRUE) { |
|
| 199 | - syslog(LOG_INFO, "$user: change status of $type <$value>. The status is now <$status>"); |
|
| 200 | - } |
|
| 201 | - else syslog(LOG_ERR, "$user: Error: ". $myconn->error); |
|
| 198 | + if ($return=$myconn->query($query) === TRUE) { |
|
| 199 | + syslog(LOG_INFO, "$user: change status of $type <$value>. The status is now <$status>"); |
|
| 200 | + } |
|
| 201 | + else syslog(LOG_ERR, "$user: Error: ". $myconn->error); |
|
| 202 | 202 | return $return; |
| 203 | 203 | } |
| 204 | 204 | |
| 205 | 205 | |
| 206 | 206 | function expire ($myconn,$user,$tables,$expireTime) { |
| 207 | - $return=TRUE; |
|
| 207 | + $return=TRUE; |
|
| 208 | 208 | $log=array(); |
| 209 | 209 | $desc = array_keys($tables); |
| 210 | 210 | foreach ($desc as $tdesc) { |
@@ -214,11 +214,11 @@ discard block |
||
| 214 | 214 | /* END OF QUERY */ |
| 215 | 215 | $log[0] = 'expired for'; |
| 216 | 216 | $log[1] = 'disabled for'; |
| 217 | - if ($myconn->multi_query($query)) { |
|
| 217 | + if ($myconn->multi_query($query)) { |
|
| 218 | 218 | $j = 0; |
| 219 | 219 | do { |
| 220 | - $numdel = $myconn->affected_rows; |
|
| 221 | - syslog(LOG_INFO, "Expire job - <$user> Permanently DELETED $numdel records ".$log[$j]." $expireTime YEARS from <".$tables["$tdesc"]['name'].'>.'); |
|
| 220 | + $numdel = $myconn->affected_rows; |
|
| 221 | + syslog(LOG_INFO, "Expire job - <$user> Permanently DELETED $numdel records ".$log[$j]." $expireTime YEARS from <".$tables["$tdesc"]['name'].'>.'); |
|
| 222 | 222 | $j++; |
| 223 | 223 | |
| 224 | 224 | } while ($myconn->next_result()); |
@@ -230,7 +230,7 @@ discard block |
||
| 230 | 230 | } |
| 231 | 231 | if ( !($return) ) syslog(LOG_EMERG, 'End of Expire job with error. See above logs. SQL Connection terminated'); |
| 232 | 232 | else syslog(LOG_INFO, 'Successfully End of Expire job. SQL Connection successfully terminated.'); |
| 233 | - return $return; |
|
| 233 | + return $return; |
|
| 234 | 234 | } |
| 235 | 235 | |
| 236 | 236 | |
@@ -303,7 +303,7 @@ discard block |
||
| 303 | 303 | if ( $entry->num_rows ) { |
| 304 | 304 | if ( $entry->num_rows == 1 ) { |
| 305 | 305 | $riga = $entry->fetch_array(MYSQLI_ASSOC); |
| 306 | - if (isListed($riga)) { |
|
| 306 | + if (isListed($riga)) { |
|
| 307 | 307 | $warn = "<$value> is already present in <$listdep> list!"; |
| 308 | 308 | $entry->free(); |
| 309 | 309 | return FALSE; |
@@ -320,7 +320,7 @@ discard block |
||
| 320 | 320 | function searchentry ($myconn,$value,$tablelist) { |
| 321 | 321 | /* Make a MYSQL query and return result */ |
| 322 | 322 | |
| 323 | - $type = $tablelist['field']; |
|
| 323 | + $type = $tablelist['field']; |
|
| 324 | 324 | |
| 325 | 325 | if ( $tablelist['milter'] ) { |
| 326 | 326 | $table = milterTable($type); |
@@ -344,7 +344,7 @@ discard block |
||
| 344 | 344 | case 'ip': |
| 345 | 345 | $query = sprintf('SELECT * FROM ( |
| 346 | 346 | SELECT *, GROUP_CONCAT(milt.name) as miltnames FROM `%s` LEFT JOIN milt ON (%s.idmilt=milt.id)' . |
| 347 | - 'WHERE `ip` = INET_ATON(\'%s\') |
|
| 347 | + 'WHERE `ip` = INET_ATON(\'%s\') |
|
| 348 | 348 | ) AS val WHERE val.ip IS NOT null', $table, $table, $value); |
| 349 | 349 | break; |
| 350 | 350 | default: |
@@ -355,33 +355,33 @@ discard block |
||
| 355 | 355 | } |
| 356 | 356 | |
| 357 | 357 | else { |
| 358 | - $table = $tablelist['name']; |
|
| 359 | - if ($value == 'ALL') $query = 'select * from '.$table; |
|
| 360 | - else { |
|
| 361 | - switch ($type) { |
|
| 362 | - case 'ip': |
|
| 363 | - $query= "select * from $table where $type = INET_ATON('$value')"; |
|
| 364 | - break; |
|
| 365 | - case 'network': |
|
| 366 | - list($sub['net'],$sub['mask'])=explode('/',$value); |
|
| 367 | - $query= sprintf('select * from `%s` |
|
| 358 | + $table = $tablelist['name']; |
|
| 359 | + if ($value == 'ALL') $query = 'select * from '.$table; |
|
| 360 | + else { |
|
| 361 | + switch ($type) { |
|
| 362 | + case 'ip': |
|
| 363 | + $query= "select * from $table where $type = INET_ATON('$value')"; |
|
| 364 | + break; |
|
| 365 | + case 'network': |
|
| 366 | + list($sub['net'],$sub['mask'])=explode('/',$value); |
|
| 367 | + $query= sprintf('select * from `%s` |
|
| 368 | 368 | WHERE ( |
| 369 | 369 | inet_aton(\'%s\') >= network AND |
| 370 | 370 | ( inet_aton(\'%s\') | ( inet_aton(\'%s\') ^ (power(2,32)-1) ) ) |
| 371 | 371 | <= network | ( netmask ^ (power(2,32)-1) ) |
| 372 | 372 | )', $table, $sub['net'], $sub['net'], $sub['mask']); |
| 373 | 373 | ; |
| 374 | - break; |
|
| 375 | - default: |
|
| 376 | - $query= "select * from $table where $type = '$value'"; |
|
| 377 | - } |
|
| 378 | - } |
|
| 374 | + break; |
|
| 375 | + default: |
|
| 376 | + $query= "select * from $table where $type = '$value'"; |
|
| 377 | + } |
|
| 378 | + } |
|
| 379 | 379 | } |
| 380 | 380 | |
| 381 | 381 | $result = $myconn->query($query); |
| 382 | 382 | if($result === false) |
| 383 | 383 | syslog(LOG_EMERG, "ALERT: Query <$query> failed: ".$myconn->error); |
| 384 | - return $result; |
|
| 384 | + return $result; |
|
| 385 | 385 | } |
| 386 | 386 | |
| 387 | 387 | function countListed ($myconn,$table) { |
@@ -396,14 +396,14 @@ discard block |
||
| 396 | 396 | |
| 397 | 397 | |
| 398 | 398 | function isFull($myconn,$typedesc,$alltables) { |
| 399 | - if (isset($alltables["$typedesc"]['limit'])) { |
|
| 399 | + if (isset($alltables["$typedesc"]['limit'])) { |
|
| 400 | 400 | if ( $alltables["$typedesc"]['milter'] ) |
| 401 | 401 | $tab = 'net'; |
| 402 | 402 | else |
| 403 | 403 | $tab = $alltables["$typedesc"]['name']; |
| 404 | - if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) |
|
| 405 | - return TRUE; |
|
| 406 | - } |
|
| 404 | + if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) |
|
| 405 | + return TRUE; |
|
| 406 | + } |
|
| 407 | 407 | return FALSE; |
| 408 | 408 | } |
| 409 | 409 | |
@@ -423,14 +423,14 @@ discard block |
||
| 423 | 423 | if ($result) { |
| 424 | 424 | printf("<pre>Your request for $type <$value> returned %d items.\n</pre>", $result->num_rows); |
| 425 | 425 | |
| 426 | - /* Check for limit in number of listed items */ |
|
| 426 | + /* Check for limit in number of listed items */ |
|
| 427 | 427 | $full = isFull($myconn,$typedesc,$tables); |
| 428 | 428 | if ($full) print '<p>'.htmlspecialchars("$typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items.').'</p>'; |
| 429 | 429 | |
| 430 | 430 | if ($result->num_rows) { |
| 431 | 431 | print $tabhtm; |
| 432 | 432 | $i=0; |
| 433 | - while ($riga = $result->fetch_array(MYSQLI_ASSOC)) { |
|
| 433 | + while ($riga = $result->fetch_array(MYSQLI_ASSOC)) { |
|
| 434 | 434 | if (isListed($riga)) { |
| 435 | 435 | if ($tables["$typedesc"]['bl']) $listed='Listed'; |
| 436 | 436 | else $listed='WhiteListed'; |
@@ -456,7 +456,7 @@ discard block |
||
| 456 | 456 | printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n", |
| 457 | 457 | $element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], $riga['user'],htmlspecialchars($riga['reason']),ask($myconn,$i,$listed,$tables,$typedesc,$element,$full,$user,$adm)); |
| 458 | 458 | $i++; |
| 459 | - } |
|
| 459 | + } |
|
| 460 | 460 | print '</tbody></table>'; |
| 461 | 461 | } |
| 462 | 462 | else { |
@@ -476,15 +476,15 @@ discard block |
||
| 476 | 476 | |
| 477 | 477 | function sendEmailWarn($tplf,$from,$to,$sbj,$emailListed,$intervalToExpire,$detail) { |
| 478 | 478 | $now = time(); |
| 479 | - setlocale (LC_TIME, 'it_IT'); |
|
| 480 | - $date = date("r",$now); |
|
| 479 | + setlocale (LC_TIME, 'it_IT'); |
|
| 480 | + $date = date("r",$now); |
|
| 481 | 481 | $messageID = md5(uniqid($now,1)) . '@' . gethostname(); |
| 482 | 482 | $mua = 'PHP/' . phpversion(); |
| 483 | 483 | |
| 484 | 484 | /* Parsing headers */ |
| 485 | 485 | if (!file_exists($tplf['header'])) { |
| 486 | - syslog(LOG_ERR, 'Sending email... template file <'.$tplf['header'].'> not found!'); |
|
| 487 | - exit; |
|
| 486 | + syslog(LOG_ERR, 'Sending email... template file <'.$tplf['header'].'> not found!'); |
|
| 487 | + exit; |
|
| 488 | 488 | } |
| 489 | 489 | |
| 490 | 490 | $head_tmpl = file_get_contents($tplf['header']); |
@@ -493,35 +493,35 @@ discard block |
||
| 493 | 493 | $headers = str_replace($arr_tpl_vars, $arr_tpl_data, $head_tmpl); |
| 494 | 494 | $headers = preg_replace( '/\r|\n/', "\r\n", $headers ); |
| 495 | 495 | |
| 496 | - /* Parsing body */ |
|
| 496 | + /* Parsing body */ |
|
| 497 | 497 | |
| 498 | - if (!file_exists($tplf['body'])) { |
|
| 499 | - syslog(LOG_ERR, 'Sending email... template file <'.$tplf['body'].'> not found!'); |
|
| 500 | - exit; |
|
| 501 | - } |
|
| 498 | + if (!file_exists($tplf['body'])) { |
|
| 499 | + syslog(LOG_ERR, 'Sending email... template file <'.$tplf['body'].'> not found!'); |
|
| 500 | + exit; |
|
| 501 | + } |
|
| 502 | 502 | |
| 503 | - $body_tmpl = file_get_contents($tplf['body']); |
|
| 504 | - $arr_tpl_vars = array('{emailListed}','{expInterval}','{reason}'); |
|
| 505 | - $arr_tpl_data = array($emailListed,$intervalToExpire,$detail); |
|
| 506 | - $body = str_replace($arr_tpl_vars, $arr_tpl_data, $body_tmpl); |
|
| 507 | - $body = preg_replace( "/\r|\n/", "\r\n", $body ); |
|
| 503 | + $body_tmpl = file_get_contents($tplf['body']); |
|
| 504 | + $arr_tpl_vars = array('{emailListed}','{expInterval}','{reason}'); |
|
| 505 | + $arr_tpl_data = array($emailListed,$intervalToExpire,$detail); |
|
| 506 | + $body = str_replace($arr_tpl_vars, $arr_tpl_data, $body_tmpl); |
|
| 507 | + $body = preg_replace( "/\r|\n/", "\r\n", $body ); |
|
| 508 | 508 | $body = wordwrap ( $body, 75 , "\r\n" ); |
| 509 | 509 | |
| 510 | 510 | /* Send the mail! */ |
| 511 | - if ( strlen(ini_get("safe_mode"))< 1) { |
|
| 512 | - $old_mailfrom = ini_get("sendmail_from"); |
|
| 513 | - ini_set("sendmail_from", $from); |
|
| 514 | - $params = sprintf("-oi -f %s", '<>'); |
|
| 515 | - if (!(mail($to,$sbj, $body,$headers,$params))) $flag=FALSE; |
|
| 516 | - else $flag=TRUE; |
|
| 517 | - if (isset($old_mailfrom)) |
|
| 518 | - ini_set("sendmail_from", $old_mailfrom); |
|
| 519 | - } |
|
| 520 | - else { |
|
| 521 | - if (!(mail($to,$sbj, $body,$headers))) $flag=FALSE; |
|
| 522 | - else $flag=TRUE; |
|
| 523 | - } |
|
| 524 | - return $flag; |
|
| 511 | + if ( strlen(ini_get("safe_mode"))< 1) { |
|
| 512 | + $old_mailfrom = ini_get("sendmail_from"); |
|
| 513 | + ini_set("sendmail_from", $from); |
|
| 514 | + $params = sprintf("-oi -f %s", '<>'); |
|
| 515 | + if (!(mail($to,$sbj, $body,$headers,$params))) $flag=FALSE; |
|
| 516 | + else $flag=TRUE; |
|
| 517 | + if (isset($old_mailfrom)) |
|
| 518 | + ini_set("sendmail_from", $old_mailfrom); |
|
| 519 | + } |
|
| 520 | + else { |
|
| 521 | + if (!(mail($to,$sbj, $body,$headers))) $flag=FALSE; |
|
| 522 | + else $flag=TRUE; |
|
| 523 | + } |
|
| 524 | + return $flag; |
|
| 525 | 525 | } |
| 526 | 526 | |
| 527 | 527 | function emailToNotify($notify_file,$dom) { |
@@ -535,62 +535,62 @@ discard block |
||
| 535 | 535 | function searchAndList ($myconn,$loguser,$tables,$typedesc,$value,$unit,&$quantity,&$reason) { |
| 536 | 536 | |
| 537 | 537 | /* Search and list value */ |
| 538 | - $type = $tables["$typedesc"]['field']; |
|
| 539 | - $table = $tables["$typedesc"]['name']; |
|
| 540 | - $result = searchentry ($myconn,$value,$tables["$typedesc"]); |
|
| 541 | - |
|
| 542 | - /* Manage abnormal conditions */ |
|
| 543 | - /* Value already present in db more than once. This is absurd. Panic! */ |
|
| 544 | - if ($result->num_rows > 1) { |
|
| 545 | - syslog(LOG_EMERG,"$loguser: PANIC! Select for $type '$value' returned ". $result->num_rows ." items instead of one. Abnormal. Contact a sysadmin or a developer."); |
|
| 546 | - $result->free(); |
|
| 547 | - return FALSE; |
|
| 548 | - } |
|
| 538 | + $type = $tables["$typedesc"]['field']; |
|
| 539 | + $table = $tables["$typedesc"]['name']; |
|
| 540 | + $result = searchentry ($myconn,$value,$tables["$typedesc"]); |
|
| 541 | + |
|
| 542 | + /* Manage abnormal conditions */ |
|
| 543 | + /* Value already present in db more than once. This is absurd. Panic! */ |
|
| 544 | + if ($result->num_rows > 1) { |
|
| 545 | + syslog(LOG_EMERG,"$loguser: PANIC! Select for $type '$value' returned ". $result->num_rows ." items instead of one. Abnormal. Contact a sysadmin or a developer."); |
|
| 546 | + $result->free(); |
|
| 547 | + return FALSE; |
|
| 548 | + } |
|
| 549 | 549 | |
| 550 | - /* Value already present in db or not present: to list anyway */ |
|
| 551 | - if ($result->num_rows >= 0) { |
|
| 552 | - /* First, check for limit in number of listed items */ |
|
| 553 | - if (isFull($myconn,$typedesc,$tables)) { |
|
| 554 | - syslog(LOG_EMERG,"$loguser: $typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items. Abnormal exit.'); |
|
| 555 | - $result->free(); |
|
| 556 | - return FALSE; |
|
| 557 | - } |
|
| 558 | - /* Second, check if the (re)list would be consistent now */ |
|
| 559 | - if (! consistentListing($myconn,$tables,$typedesc,$value,$whynot) ) { |
|
| 560 | - syslog(LOG_ERR, $loguser.': '.$whynot); |
|
| 561 | - $result->free(); |
|
| 562 | - return FALSE; |
|
| 563 | - } |
|
| 564 | - } |
|
| 565 | - /* End of abnormal conditions */ |
|
| 550 | + /* Value already present in db or not present: to list anyway */ |
|
| 551 | + if ($result->num_rows >= 0) { |
|
| 552 | + /* First, check for limit in number of listed items */ |
|
| 553 | + if (isFull($myconn,$typedesc,$tables)) { |
|
| 554 | + syslog(LOG_EMERG,"$loguser: $typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items. Abnormal exit.'); |
|
| 555 | + $result->free(); |
|
| 556 | + return FALSE; |
|
| 557 | + } |
|
| 558 | + /* Second, check if the (re)list would be consistent now */ |
|
| 559 | + if (! consistentListing($myconn,$tables,$typedesc,$value,$whynot) ) { |
|
| 560 | + syslog(LOG_ERR, $loguser.': '.$whynot); |
|
| 561 | + $result->free(); |
|
| 562 | + return FALSE; |
|
| 563 | + } |
|
| 564 | + } |
|
| 565 | + /* End of abnormal conditions */ |
|
| 566 | 566 | |
| 567 | 567 | |
| 568 | - /* Finally, here I can list the value! */ |
|
| 568 | + /* Finally, here I can list the value! */ |
|
| 569 | 569 | $thisentry = $result->fetch_array(MYSQLI_ASSOC); |
| 570 | - switch ($result->num_rows) { |
|
| 571 | - /* Relist value if already present */ |
|
| 572 | - case 1: |
|
| 573 | - if ( isListed($thisentry) ) { |
|
| 570 | + switch ($result->num_rows) { |
|
| 571 | + /* Relist value if already present */ |
|
| 572 | + case 1: |
|
| 573 | + if ( isListed($thisentry) ) { |
|
| 574 | 574 | /* Entry already listed */ |
| 575 | 575 | $expdate = $thisentry['exp']; |
| 576 | 576 | $reason = sprintf('%s. Already listed. Adding 1 DAY to previous expire date.', |
| 577 | 577 | $reason); |
| 578 | 578 | $quantity = 1; |
| 579 | 579 | $unit = 'DAY'; |
| 580 | - } |
|
| 580 | + } |
|
| 581 | 581 | else { |
| 582 | - /* Entry delisted */ |
|
| 582 | + /* Entry delisted */ |
|
| 583 | 583 | $quantity *= $thisentry['nlist']; |
| 584 | 584 | $expdate = 0; /* This forces expiration from CURRENT_TIMESTAMP */ |
| 585 | 585 | } |
| 586 | 586 | $result->free(); |
| 587 | - return relist ($myconn,$loguser,$value,$type,$table,$unit,$quantity,$reason, $expdate); |
|
| 587 | + return relist ($myconn,$loguser,$value,$type,$table,$unit,$quantity,$reason, $expdate); |
|
| 588 | 588 | |
| 589 | - /* First time list value */ |
|
| 590 | - case 0: |
|
| 591 | - $result->free(); |
|
| 592 | - return addtolist ($myconn,$loguser,$value,$tables["$typedesc"],$unit,$quantity,$reason,$_); |
|
| 593 | - } |
|
| 589 | + /* First time list value */ |
|
| 590 | + case 0: |
|
| 591 | + $result->free(); |
|
| 592 | + return addtolist ($myconn,$loguser,$value,$tables["$typedesc"],$unit,$quantity,$reason,$_); |
|
| 593 | + } |
|
| 594 | 594 | } |
| 595 | 595 | |
| 596 | 596 | |
@@ -623,7 +623,7 @@ discard block |
||
| 623 | 623 | return FALSE; |
| 624 | 624 | } |
| 625 | 625 | $result = searchentry ($myconn,'ALL',$tabletype); |
| 626 | - if ($result->num_rows) { |
|
| 626 | + if ($result->num_rows) { |
|
| 627 | 627 | while ($row = $result->fetch_array(MYSQLI_ASSOC)) { |
| 628 | 628 | $thisNet = long2ip($row['network']).'/'.long2ip($row['netmask']); |
| 629 | 629 | if ( isIn($thisNet, $net) ) { |
@@ -643,7 +643,7 @@ discard block |
||
| 643 | 643 | /* For miltermap */ |
| 644 | 644 | function checkMilterConf($table) { |
| 645 | 645 | if (isset($table['milter'])) { |
| 646 | - if ($table['milter'] === TRUE) { |
|
| 646 | + if ($table['milter'] === TRUE) { |
|
| 647 | 647 | switch ( $table['field'] ) { |
| 648 | 648 | case 'network': |
| 649 | 649 | case 'ip': |
@@ -666,15 +666,15 @@ discard block |
||
| 666 | 666 | |
| 667 | 667 | function milterTable($t) { |
| 668 | 668 | /* Return the milter object table for type t or FALSE on error */ |
| 669 | - switch ($t) { |
|
| 670 | - case 'network': |
|
| 671 | - return 'net'; |
|
| 672 | - case 'ip': |
|
| 673 | - return 'ips'; |
|
| 674 | - default: |
|
| 669 | + switch ($t) { |
|
| 670 | + case 'network': |
|
| 671 | + return 'net'; |
|
| 672 | + case 'ip': |
|
| 673 | + return 'ips'; |
|
| 674 | + default: |
|
| 675 | 675 | syslog(LOG_EMERG, "ALERT: type <$t> not allowed in configuration. "); |
| 676 | - return FALSE; |
|
| 677 | - } |
|
| 676 | + return FALSE; |
|
| 677 | + } |
|
| 678 | 678 | } |
| 679 | 679 | |
| 680 | 680 | |
@@ -682,9 +682,9 @@ discard block |
||
| 682 | 682 | $milters=array(); |
| 683 | 683 | $query = 'SELECT `name` FROM `config`'; |
| 684 | 684 | |
| 685 | - $result = $myconn->query($query); |
|
| 686 | - if($result === false) { |
|
| 687 | - syslog(LOG_EMERG, "$loguser: ALERT: Query <$query> failed: ".$myconn->error); |
|
| 685 | + $result = $myconn->query($query); |
|
| 686 | + if($result === false) { |
|
| 687 | + syslog(LOG_EMERG, "$loguser: ALERT: Query <$query> failed: ".$myconn->error); |
|
| 688 | 688 | return FALSE; |
| 689 | 689 | } |
| 690 | 690 | if ($result->num_rows) { |
@@ -754,21 +754,21 @@ discard block |
||
| 754 | 754 | |
| 755 | 755 | function curl_get($url, array $get = NULL, array $options = array(), $loguser) |
| 756 | 756 | { |
| 757 | - $defaults = array( |
|
| 758 | - CURLOPT_URL => $url. (strpos($url, '?') === FALSE ? '?' : ''). http_build_query($get), |
|
| 759 | - CURLOPT_HEADER => 0, |
|
| 760 | - CURLOPT_RETURNTRANSFER => TRUE, |
|
| 761 | - CURLOPT_TIMEOUT => 4 |
|
| 762 | - ); |
|
| 763 | - |
|
| 764 | - $ch = curl_init(); |
|
| 765 | - curl_setopt_array($ch, ($options + $defaults)); |
|
| 766 | - if( ! $result = curl_exec($ch)) |
|
| 767 | - { |
|
| 768 | - syslog(LOG_ERR, sprintf('%s: CURL Error: <%s>', $loguser, curl_error($ch))); |
|
| 769 | - } |
|
| 770 | - curl_close($ch); |
|
| 771 | - return $result; |
|
| 757 | + $defaults = array( |
|
| 758 | + CURLOPT_URL => $url. (strpos($url, '?') === FALSE ? '?' : ''). http_build_query($get), |
|
| 759 | + CURLOPT_HEADER => 0, |
|
| 760 | + CURLOPT_RETURNTRANSFER => TRUE, |
|
| 761 | + CURLOPT_TIMEOUT => 4 |
|
| 762 | + ); |
|
| 763 | + |
|
| 764 | + $ch = curl_init(); |
|
| 765 | + curl_setopt_array($ch, ($options + $defaults)); |
|
| 766 | + if( ! $result = curl_exec($ch)) |
|
| 767 | + { |
|
| 768 | + syslog(LOG_ERR, sprintf('%s: CURL Error: <%s>', $loguser, curl_error($ch))); |
|
| 769 | + } |
|
| 770 | + curl_close($ch); |
|
| 771 | + return $result; |
|
| 772 | 772 | } |
| 773 | 773 | |
| 774 | 774 | /* |
@@ -27,32 +27,32 @@ |
||
| 27 | 27 | |
| 28 | 28 | |
| 29 | 29 | $data = array( |
| 30 | - 'date' => NULL, |
|
| 31 | - 'from' => NULL, |
|
| 32 | - 'messageid' => NULL, |
|
| 33 | - 'dmarc' => array( |
|
| 34 | - 'result' => NULL, |
|
| 35 | - 'dom' => NULL |
|
| 36 | - ), |
|
| 37 | - 'spf' => array( |
|
| 38 | - 'result' => NULL, |
|
| 39 | - 'dom' => NULL |
|
| 40 | - ), |
|
| 41 | - 'dkim' => array( |
|
| 42 | - 'result' => NULL, |
|
| 43 | - 'dom' => NULL |
|
| 44 | - ), |
|
| 45 | - 'spam' => array( |
|
| 46 | - 'status' => NULL, |
|
| 47 | - 'score' => NULL, |
|
| 48 | - 'th' => NULL, |
|
| 49 | - ), |
|
| 50 | - 'dspam' => array( |
|
| 51 | - 'type' => NULL, |
|
| 52 | - 'level' => NULL, |
|
| 53 | - 'learn' => NULL |
|
| 54 | - ), |
|
| 55 | - 'warn' => NULL |
|
| 30 | + 'date' => NULL, |
|
| 31 | + 'from' => NULL, |
|
| 32 | + 'messageid' => NULL, |
|
| 33 | + 'dmarc' => array( |
|
| 34 | + 'result' => NULL, |
|
| 35 | + 'dom' => NULL |
|
| 36 | + ), |
|
| 37 | + 'spf' => array( |
|
| 38 | + 'result' => NULL, |
|
| 39 | + 'dom' => NULL |
|
| 40 | + ), |
|
| 41 | + 'dkim' => array( |
|
| 42 | + 'result' => NULL, |
|
| 43 | + 'dom' => NULL |
|
| 44 | + ), |
|
| 45 | + 'spam' => array( |
|
| 46 | + 'status' => NULL, |
|
| 47 | + 'score' => NULL, |
|
| 48 | + 'th' => NULL, |
|
| 49 | + ), |
|
| 50 | + 'dspam' => array( |
|
| 51 | + 'type' => NULL, |
|
| 52 | + 'level' => NULL, |
|
| 53 | + 'learn' => NULL |
|
| 54 | + ), |
|
| 55 | + 'warn' => NULL |
|
| 56 | 56 | ); |
| 57 | 57 | |
| 58 | 58 | if (empty($folder)) exit ('<p>No folder found.</p>'); /* This should not occur */ |
@@ -16,10 +16,10 @@ |
||
| 16 | 16 | require_once('function.php'); |
| 17 | 17 | |
| 18 | 18 | if ( !isset($version) ) { |
| 19 | - openlog('mailClassifierEmergency', LOG_PID, LOG_LOCAL0); |
|
| 20 | - syslog (LOG_EMERG, sprintf('unknown: I can\'t read the config files. Do you have configured the $path in %s?', __FILE__)); |
|
| 21 | - closelog(); |
|
| 22 | - exit(255); |
|
| 19 | + openlog('mailClassifierEmergency', LOG_PID, LOG_LOCAL0); |
|
| 20 | + syslog (LOG_EMERG, sprintf('unknown: I can\'t read the config files. Do you have configured the $path in %s?', __FILE__)); |
|
| 21 | + closelog(); |
|
| 22 | + exit(255); |
|
| 23 | 23 | } |
| 24 | 24 | |
| 25 | 25 | checkSSL(); |
@@ -15,7 +15,7 @@ |
||
| 15 | 15 | if (is_array($folders)) { |
| 16 | 16 | print '<option value="" selected disabled>Choose a folder</option>'; |
| 17 | 17 | foreach ( $folders as $folder ) |
| 18 | - printf('<option value="%s">%s</option>', |
|
| 18 | + printf('<option value="%s">%s</option>', |
|
| 19 | 19 | $folder, |
| 20 | 20 | htmlspecialchars(mb_convert_encoding($folder, "UTF-8", "UTF7-IMAP"))); |
| 21 | 21 | } |
@@ -3,13 +3,13 @@ discard block |
||
| 3 | 3 | function imapFolder($cf, $username) { |
| 4 | 4 | $return = array(); |
| 5 | 5 | $open='{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}'; |
| 6 | - $m_mail = imap_open($open, $username, $cf['authpassword'], OP_READONLY) |
|
| 7 | - or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error()); |
|
| 8 | - if ( !$m_mail ) exit(254); |
|
| 6 | + $m_mail = imap_open($open, $username, $cf['authpassword'], OP_READONLY) |
|
| 7 | + or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error()); |
|
| 8 | + if ( !$m_mail ) exit(254); |
|
| 9 | 9 | |
| 10 | 10 | |
| 11 | - syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...'); |
|
| 12 | - //get all folder |
|
| 11 | + syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...'); |
|
| 12 | + //get all folder |
|
| 13 | 13 | $list = imap_list($m_mail, $open, "*"); |
| 14 | 14 | imap_close($m_mail); |
| 15 | 15 | if (is_array($list)) |
@@ -23,7 +23,7 @@ discard block |
||
| 23 | 23 | function imapFind ($cf, $username, $folder) { |
| 24 | 24 | $head=array(); |
| 25 | 25 | $m_mail = imap_open('{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}'.$folder, $username,$cf['authpassword'], OP_READONLY) |
| 26 | - or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error()); |
|
| 26 | + or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error()); |
|
| 27 | 27 | if ( !$m_mail ) exit(254); |
| 28 | 28 | |
| 29 | 29 | |
@@ -36,12 +36,12 @@ discard block |
||
| 36 | 36 | // Order results starting from newest message |
| 37 | 37 | if ( empty($m_search) ) { |
| 38 | 38 | syslog (LOG_INFO,$cf['user'].": No suitable mail found in <$folder> folder."); |
| 39 | - if ( $ierr = imap_errors() ) |
|
| 40 | - foreach ( $ierr as $thiserr ) |
|
| 41 | - syslog (LOG_ERR, $cf['user'].": IMAP Error: $thiserr"); |
|
| 42 | - if ( $ierr = imap_alerts() ) |
|
| 43 | - foreach ( $ierr as $thiserr ) |
|
| 44 | - syslog (LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr"); |
|
| 39 | + if ( $ierr = imap_errors() ) |
|
| 40 | + foreach ( $ierr as $thiserr ) |
|
| 41 | + syslog (LOG_ERR, $cf['user'].": IMAP Error: $thiserr"); |
|
| 42 | + if ( $ierr = imap_alerts() ) |
|
| 43 | + foreach ( $ierr as $thiserr ) |
|
| 44 | + syslog (LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr"); |
|
| 45 | 45 | imap_close( $m_mail ); |
| 46 | 46 | return FALSE; |
| 47 | 47 | } |
@@ -49,7 +49,7 @@ discard block |
||
| 49 | 49 | syslog (LOG_INFO,$cf['user'].": Found $nmes mail in <$folder> folder."); |
| 50 | 50 | if ($nmes>0) rsort($m_search); |
| 51 | 51 | |
| 52 | - // loop for each message |
|
| 52 | + // loop for each message |
|
| 53 | 53 | foreach ($m_search as $onem) |
| 54 | 54 | $head[] = imap_fetchheader($m_mail, $onem ); |
| 55 | 55 | imap_close($m_mail); |
@@ -80,52 +80,52 @@ discard block |
||
| 80 | 80 | /* Each line must end with /r/n */ |
| 81 | 81 | |
| 82 | 82 | $result = array( |
| 83 | - 'date' => NULL, |
|
| 84 | - 'from' => NULL, |
|
| 85 | - 'messageid' => NULL, |
|
| 83 | + 'date' => NULL, |
|
| 84 | + 'from' => NULL, |
|
| 85 | + 'messageid' => NULL, |
|
| 86 | 86 | 'dmarc' => array( |
| 87 | 87 | 'result' => NULL, |
| 88 | 88 | 'dom' => NULL |
| 89 | 89 | ), |
| 90 | 90 | 'spf' => array( |
| 91 | - 'result' => NULL, |
|
| 92 | - 'dom' => NULL |
|
| 93 | - ), |
|
| 91 | + 'result' => NULL, |
|
| 92 | + 'dom' => NULL |
|
| 93 | + ), |
|
| 94 | 94 | 'dkim' => array( |
| 95 | - 'result' => NULL, |
|
| 96 | - 'dom' => NULL |
|
| 97 | - ), |
|
| 98 | - 'spam' => array( |
|
| 99 | - 'status' => NULL, |
|
| 100 | - 'score' => NULL, |
|
| 101 | - 'th' => NULL, |
|
| 102 | - ), |
|
| 103 | - 'dspam' => array( |
|
| 104 | - 'type' => NULL, |
|
| 105 | - 'level' => NULL, |
|
| 95 | + 'result' => NULL, |
|
| 96 | + 'dom' => NULL |
|
| 97 | + ), |
|
| 98 | + 'spam' => array( |
|
| 99 | + 'status' => NULL, |
|
| 100 | + 'score' => NULL, |
|
| 101 | + 'th' => NULL, |
|
| 102 | + ), |
|
| 103 | + 'dspam' => array( |
|
| 104 | + 'type' => NULL, |
|
| 105 | + 'level' => NULL, |
|
| 106 | 106 | 'learn' => NULL |
| 107 | - ), |
|
| 107 | + ), |
|
| 108 | 108 | 'warn' => NULL |
| 109 | - ); |
|
| 109 | + ); |
|
| 110 | 110 | |
| 111 | 111 | |
| 112 | - if ( preg_match_all ('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dmarc=(?<dmarc>\w+)\s+\(p=\w+\s+dis=\w+\)\s+header\.from=(?<DMARCfrom>[\w\.]+)/m',$header,$received) ) { |
|
| 112 | + if ( preg_match_all ('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dmarc=(?<dmarc>\w+)\s+\(p=\w+\s+dis=\w+\)\s+header\.from=(?<DMARCfrom>[\w\.]+)/m',$header,$received) ) { |
|
| 113 | 113 | $k=0; |
| 114 | - for ($i = count($received[0])-1;$i>=0;$i--) { |
|
| 115 | - foreach ($ARhosts as $mx) { |
|
| 114 | + for ($i = count($received[0])-1;$i>=0;$i--) { |
|
| 115 | + foreach ($ARhosts as $mx) { |
|
| 116 | 116 | if ($mx == $received['host'][$i]) { |
| 117 | 117 | /* This is a trusted AR result */ |
| 118 | 118 | $result['dmarc']['result']=$received['dmarc'][$i]; |
| 119 | 119 | $result['dmarc']['dom'] = $received['DMARCfrom'][$i]; |
| 120 | 120 | $k++; |
| 121 | 121 | } |
| 122 | - } |
|
| 122 | + } |
|
| 123 | + } |
|
| 123 | 124 | } |
| 124 | - } |
|
| 125 | 125 | $received=NULL; |
| 126 | 126 | if ($k>1) $result['warn'][] = 'The trusted DMARC AR Headers are present more than once. Something wrong.'; |
| 127 | 127 | |
| 128 | - if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m',$header,$received) ) { |
|
| 128 | + if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m',$header,$received) ) { |
|
| 129 | 129 | $k=0; |
| 130 | 130 | for ($i = count($received[0])-1;$i>=0;$i--) { |
| 131 | 131 | foreach ($ARhosts as $mx) { |
@@ -134,25 +134,25 @@ discard block |
||
| 134 | 134 | $result['spf']['result']=$received['spf'][$i]; |
| 135 | 135 | $result['spf']['dom'] = $received['SPFfrom'][$i]; |
| 136 | 136 | $k++; |
| 137 | - } |
|
| 138 | - } |
|
| 139 | - } |
|
| 137 | + } |
|
| 138 | + } |
|
| 139 | + } |
|
| 140 | 140 | } |
| 141 | 141 | $received=NULL; |
| 142 | 142 | if ($k>1) $result['warn'][] = 'The trusted SPF AR Headers are present more than once. Something wrong.'; |
| 143 | 143 | |
| 144 | 144 | $k=0; |
| 145 | - if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m',$header,$received) ) { |
|
| 145 | + if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m',$header,$received) ) { |
|
| 146 | 146 | for ($i = count($received[0])-1;$i>=0;$i--) { |
| 147 | - foreach ($ARhosts as $mx) { |
|
| 148 | - if ($mx == $received['host'][$i]) { |
|
| 149 | - /* This is a trusted AR result */ |
|
| 150 | - $result['dkim']['result']=$received['dkim'][$i]; |
|
| 151 | - $result['dkim']['dom'] = $received['DKIMdom'][$i]; |
|
| 147 | + foreach ($ARhosts as $mx) { |
|
| 148 | + if ($mx == $received['host'][$i]) { |
|
| 149 | + /* This is a trusted AR result */ |
|
| 150 | + $result['dkim']['result']=$received['dkim'][$i]; |
|
| 151 | + $result['dkim']['dom'] = $received['DKIMdom'][$i]; |
|
| 152 | 152 | $k++; |
| 153 | - } |
|
| 154 | - } |
|
| 155 | - } |
|
| 153 | + } |
|
| 154 | + } |
|
| 155 | + } |
|
| 156 | 156 | } |
| 157 | 157 | $received=NULL; |
| 158 | 158 | if ($k>1) $result['warn'][] = 'The trusted DKIM AR Headers are present more than once. Something wrong.'; |
@@ -160,59 +160,59 @@ discard block |
||
| 160 | 160 | if ($dpl) { /* Use Spamassassin Plugin */ |
| 161 | 161 | if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*DSPAM_(?P<dtype>SPAM|HAM)_(?P<dlevel>\d\d)(?:.|\r\n\s+)*\]/m',$header,$received) ) { |
| 162 | 162 | $result['spam']['status']=$received['spamstatus'][0]; |
| 163 | - $result['spam']['score'] = $received['score'][0]; |
|
| 163 | + $result['spam']['score'] = $received['score'][0]; |
|
| 164 | 164 | $result['spam']['th'] = $received['th'][0]; |
| 165 | 165 | $result['dspam']['type'] = dspamType($received['dtype'][0]); |
| 166 | 166 | $result['dspam']['level'] =$received['dlevel'][0]; |
| 167 | - } |
|
| 168 | - if (count($received[0])>1) $result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.'; |
|
| 167 | + } |
|
| 168 | + if (count($received[0])>1) $result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.'; |
|
| 169 | 169 | } |
| 170 | 170 | else { /* Parse apart all DSPAM Header and calculate a level */ |
| 171 | 171 | if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*\]/m',$header,$received) ) { |
| 172 | - $result['spam']['status']=$received['spamstatus'][0]; |
|
| 173 | - $result['spam']['score'] = $received['score'][0]; |
|
| 174 | - $result['spam']['th'] = $received['th'][0]; |
|
| 172 | + $result['spam']['status']=$received['spamstatus'][0]; |
|
| 173 | + $result['spam']['score'] = $received['score'][0]; |
|
| 174 | + $result['spam']['th'] = $received['th'][0]; |
|
| 175 | 175 | if (count($received[0])>1) |
| 176 | 176 | $result['warn'][]= 'The Spamassassin Headers are present more than once. I consider only the last one.'; |
| 177 | 177 | } |
| 178 | 178 | if ( preg_match ('/\r\nX\-DSPAM\-Result:\s(?P<result>.*)\r\n/',$header,$received) != 1) |
| 179 | - $result['warn'] = 'DSPAM Result invalid, not present or present more than once.'; |
|
| 180 | - else |
|
| 181 | - $result['dspam']['type']=$received['result']; |
|
| 179 | + $result['warn'] = 'DSPAM Result invalid, not present or present more than once.'; |
|
| 180 | + else |
|
| 181 | + $result['dspam']['type']=$received['result']; |
|
| 182 | 182 | $prob = NULL; |
| 183 | 183 | $conf = NULL; |
| 184 | - if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1) |
|
| 185 | - $result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.'; |
|
| 184 | + if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1) |
|
| 185 | + $result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.'; |
|
| 186 | 186 | else |
| 187 | 187 | $prob = $received['prob']; |
| 188 | 188 | if ( preg_match ('/\r\nX\-DSPAM\-Confidence:\s(?P<conf>.*)\r\n/',$header,$received) != 1) |
| 189 | - $result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.'; |
|
| 189 | + $result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.'; |
|
| 190 | 190 | else |
| 191 | 191 | $conf = $received['conf']; |
| 192 | 192 | $result['dspam']['level'] = dspamLevel($prob,$conf); |
| 193 | 193 | } |
| 194 | 194 | $received=NULL; |
| 195 | 195 | if ( preg_match ('/\r\nFrom:\s(?P<from>.*)\r\n/',$header,$received) != 1) |
| 196 | - $result['warn'][] = 'From header invalid or not present'; |
|
| 197 | - else |
|
| 198 | - $result['from'] = $received['from']; |
|
| 196 | + $result['warn'][] = 'From header invalid or not present'; |
|
| 197 | + else |
|
| 198 | + $result['from'] = $received['from']; |
|
| 199 | 199 | |
| 200 | - if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1) |
|
| 201 | - $result['warn'][] = 'Date header invalid or not present'; |
|
| 200 | + if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1) |
|
| 201 | + $result['warn'][] = 'Date header invalid or not present'; |
|
| 202 | 202 | else |
| 203 | 203 | $result['date'] = $received['date']; |
| 204 | 204 | |
| 205 | 205 | $received=NULL; |
| 206 | - if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1) |
|
| 207 | - $result['warn'][] = 'Message-ID invalid, not present or present more than once.'; |
|
| 206 | + if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1) |
|
| 207 | + $result['warn'][] = 'Message-ID invalid, not present or present more than once.'; |
|
| 208 | 208 | else |
| 209 | 209 | $result['messageid']=$received['mid']; |
| 210 | 210 | |
| 211 | - $received=NULL; |
|
| 211 | + $received=NULL; |
|
| 212 | 212 | |
| 213 | - switch ($learn) { |
|
| 213 | + switch ($learn) { |
|
| 214 | 214 | case 'dspamc': |
| 215 | - if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1) |
|
| 215 | + if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1) |
|
| 216 | 216 | $result['warn'] = 'DSPAM Signature invalid, not present or present more than once.'; |
| 217 | 217 | else |
| 218 | 218 | $result['dspam']['learn']=$received['sig']; |
@@ -223,23 +223,23 @@ discard block |
||
| 223 | 223 | syslog (LOG_INFO,$user.': Error in "learn" imap configuration value. Please, set "dspamc" or "false".'); |
| 224 | 224 | } |
| 225 | 225 | |
| 226 | - return $result; |
|
| 226 | + return $result; |
|
| 227 | 227 | } |
| 228 | 228 | |
| 229 | 229 | |
| 230 | 230 | |
| 231 | 231 | |
| 232 | 232 | function printTableHeader($title,$content,$footer=FALSE,$fcontent) { |
| 233 | - print <<<END |
|
| 233 | + print <<<END |
|
| 234 | 234 | <caption>$title</caption> |
| 235 | 235 | <thead> |
| 236 | 236 | <tr> |
| 237 | 237 | END; |
| 238 | 238 | $kcontent = array_keys($content); |
| 239 | - $cols = count($kcontent); |
|
| 240 | - for ($i=0; $i<$cols; $i++) { |
|
| 239 | + $cols = count($kcontent); |
|
| 240 | + for ($i=0; $i<$cols; $i++) { |
|
| 241 | 241 | $key = $kcontent[$i]; |
| 242 | - printf ('<th colspan="%d" rowspan="%d">%s</th>', |
|
| 242 | + printf ('<th colspan="%d" rowspan="%d">%s</th>', |
|
| 243 | 243 | !is_array($content[$key]) ?: |
| 244 | 244 | count(array_keys($content[$key])) ?: '1', |
| 245 | 245 | !is_array($content[$key]) ?: |
@@ -255,13 +255,13 @@ discard block |
||
| 255 | 255 | } |
| 256 | 256 | } |
| 257 | 257 | |
| 258 | - print '</tr></thead>'; |
|
| 259 | - if ($footer) { |
|
| 260 | - print '<tfoot><tr>'; |
|
| 261 | - print "<th colspan=\"$cols\">".$fcontent.'</th>'; |
|
| 262 | - print '</tr></tfoot>'; |
|
| 263 | - } |
|
| 264 | - return TRUE; |
|
| 258 | + print '</tr></thead>'; |
|
| 259 | + if ($footer) { |
|
| 260 | + print '<tfoot><tr>'; |
|
| 261 | + print "<th colspan=\"$cols\">".$fcontent.'</th>'; |
|
| 262 | + print '</tr></tfoot>'; |
|
| 263 | + } |
|
| 264 | + return TRUE; |
|
| 265 | 265 | } |
| 266 | 266 | |
| 267 | 267 | |
@@ -336,7 +336,7 @@ discard block |
||
| 336 | 336 | } |
| 337 | 337 | /* Spamassassin format */ |
| 338 | 338 | if (isset($row['status'])) |
| 339 | - switch($row['status']) { |
|
| 339 | + switch($row['status']) { |
|
| 340 | 340 | case 'No': |
| 341 | 341 | $color = 'rgba(0,255,0, %.1f)'; |
| 342 | 342 | break; |