@@ -13,7 +13,7 @@ |
||
13 | 13 | $err = NULL; |
14 | 14 | |
15 | 15 | if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE ) |
16 | - exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error); |
|
16 | + exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error); |
|
17 | 17 | |
18 | 18 | if (addtolist ($mysqli,$user,$_POST['value'],$tables["$typedesc"],$_POST['unit'],$_POST['quantity'],$_POST['reason'],$err)) |
19 | 19 | print 'OK '.$_POST["type"].' <'.$_POST['value'].'> first time listed for '.$_POST['quantity'].$_POST['unit'].'.'; |
@@ -10,7 +10,7 @@ |
||
10 | 10 | $user = username(); |
11 | 11 | |
12 | 12 | if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE ) |
13 | - exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error); |
|
13 | + exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error); |
|
14 | 14 | if (remove ($mysqli,$user,$_POST['value'],$type,$table)) |
15 | 15 | print 'OK '.$typedesc.' <'.$_POST['value'].'> permanently REMOVED!'; |
16 | 16 | else |
@@ -12,7 +12,7 @@ |
||
12 | 12 | $user = username(); |
13 | 13 | |
14 | 14 | if ( ($mysqli = myConnect($dbhost, $userdb, $pwd, $db, $dbport, $tables, $typedesc, $user)) === FALSE ) |
15 | - exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error); |
|
15 | + exit ($user.': Connect Error (' . $mysqli->connect_errno . ') '. $mysqli->connect_error); |
|
16 | 16 | |
17 | 17 | if (changestatus($mysqli,username(),$_POST['value'],'0',$type,$table)) |
18 | 18 | print 'OK '.$_POST["type"].' <'.$_POST['value'].'> delisted.'; |
@@ -26,17 +26,17 @@ discard block |
||
26 | 26 | |
27 | 27 | /* Conf */ |
28 | 28 | if (!isset($_GET['conf'])) { |
29 | - syslog(LOG_ALERT, |
|
30 | - sprintf('%s: you must insert the config file name as a GET parameter, such as %s?conf=listEmail.conf', |
|
31 | - $user, $_SERVER['SCRIPT_NAME']) ); |
|
32 | - exit(254); |
|
29 | + syslog(LOG_ALERT, |
|
30 | + sprintf('%s: you must insert the config file name as a GET parameter, such as %s?conf=listEmail.conf', |
|
31 | + $user, $_SERVER['SCRIPT_NAME']) ); |
|
32 | + exit(254); |
|
33 | 33 | } |
34 | 34 | $fileconf = $_GET['conf']; |
35 | 35 | if ( !file_exists(dirname(__FILE__) . '/../' . $fileconf) ) { |
36 | - syslog(LOG_ALERT, |
|
37 | - sprintf('%s: the configuration file <%s> doesn\'t exist.', |
|
38 | - $user, $fileconf )); |
|
39 | - exit(254); |
|
36 | + syslog(LOG_ALERT, |
|
37 | + sprintf('%s: the configuration file <%s> doesn\'t exist.', |
|
38 | + $user, $fileconf )); |
|
39 | + exit(254); |
|
40 | 40 | } |
41 | 41 | |
42 | 42 | closelog(); |
@@ -64,8 +64,8 @@ discard block |
||
64 | 64 | |
65 | 65 | /* check you select a blocklist */ |
66 | 66 | if ( !$tables["$typedesc"]['bl'] ) { |
67 | - syslog(LOG_EMERG,"$user: <$typedesc> is not a blocklist. Are you stupid? Do you want to whitelist a spammer? I refuse to continue."); |
|
68 | - exit (254); |
|
67 | + syslog(LOG_EMERG,"$user: <$typedesc> is not a blocklist. Are you stupid? Do you want to whitelist a spammer? I refuse to continue."); |
|
68 | + exit (254); |
|
69 | 69 | } |
70 | 70 | |
71 | 71 | |
@@ -95,15 +95,15 @@ discard block |
||
95 | 95 | if (preg_match_all('/^https?\:\/\/(?<splunkhost>[\w\.\-]+)\:8000\/app\/(?<splunkapp>[\w\.\-]+)\/\@go\?sid=(?<job>[\w\.\-\d]+)$/', |
96 | 96 | $webhook['results_link'], $out, PREG_PATTERN_ORDER) === FALSE) { |
97 | 97 | syslog(LOG_ALERT, |
98 | - sprintf('%s: unexpected error: can\'t parse the results link returned by webhook (<%s>).', |
|
98 | + sprintf('%s: unexpected error: can\'t parse the results link returned by webhook (<%s>).', |
|
99 | 99 | $user, $webhook['results_link']) ); |
100 | 100 | return 255; |
101 | 101 | } |
102 | 102 | |
103 | 103 | if ( $webhook['app'] != $out['splunkapp'][0] ) { |
104 | 104 | syslog(LOG_ALERT, |
105 | - sprintf('%s: unexpected error: the APP returned by webhook (<%s>) doesn\'t match the app (<%s>) in result link.', |
|
106 | - $user, $webhook['app'], $out['splunkapp'][0] ) ); |
|
105 | + sprintf('%s: unexpected error: the APP returned by webhook (<%s>) doesn\'t match the app (<%s>) in result link.', |
|
106 | + $user, $webhook['app'], $out['splunkapp'][0] ) ); |
|
107 | 107 | return 255; |
108 | 108 | } |
109 | 109 | |
@@ -137,14 +137,14 @@ discard block |
||
137 | 137 | |
138 | 138 | $nr = count ($results); |
139 | 139 | for ($i=1; $i<$nr; $i++) { /* We skip first header line (i=0) */ |
140 | - $data = str_getcsv($results[$i], ','); |
|
141 | - $thisVal = $data[1]; |
|
142 | - unset($data[1]); |
|
143 | - $data = array_values($data); |
|
144 | - if ( !in_array($thisVal,array_keys($tolist)) ) |
|
145 | - $tolist["$thisVal"] = $data; |
|
146 | - else if ($data[3]>$tolist[$thisVal][3]) |
|
147 | - $tolist["$thisVal"] = $data; |
|
140 | + $data = str_getcsv($results[$i], ','); |
|
141 | + $thisVal = $data[1]; |
|
142 | + unset($data[1]); |
|
143 | + $data = array_values($data); |
|
144 | + if ( !in_array($thisVal,array_keys($tolist)) ) |
|
145 | + $tolist["$thisVal"] = $data; |
|
146 | + else if ($data[3]>$tolist[$thisVal][3]) |
|
147 | + $tolist["$thisVal"] = $data; |
|
148 | 148 | } |
149 | 149 | |
150 | 150 | /* Make MYSQL connection */ |
@@ -154,34 +154,34 @@ discard block |
||
154 | 154 | exit (254); |
155 | 155 | |
156 | 156 | foreach ( array_keys($tolist) as $value) { |
157 | - $quantity = $conf['quantity']; |
|
158 | - $reason = 'On ['.$tolist["$value"][0]."] <$value> sent ".$tolist["$value"][1].' messages to '.$tolist["$value"][2].' recipients.'; |
|
159 | - if ( $tolist["$value"][3] >= $threshold ) { |
|
160 | - if ( searchAndList ($mysqli,$user,$tables,$typedesc,$value,$unit,$quantity,$reason) ) { |
|
161 | - syslog (LOG_INFO, "$user: ".'Listing reason: '.$reason); |
|
162 | - /* Send a email to domain admin if you list an email */ |
|
163 | - if ( ( $tables["$typedesc"]['field'] == 'email' ) OR ( $tables["$typedesc"]['field'] == 'username' ) ) { |
|
164 | - /* Sometime uid are in the form of <user>@<domain> ... */ |
|
165 | - if ( strpos($value, '@') !== FALSE ) { |
|
166 | - $domain = substr(strrchr($value, '@'), 1); |
|
167 | - if ( strpos($domain, '@') === FALSE ) { |
|
168 | - $recip = emailToNotify($domainNotify_file,$domain); |
|
169 | - $subject = sprintf('%s <%s> is now blocked because exceedes limits on outgoing emails', |
|
170 | - $tables["$typedesc"]['field'], $value); |
|
171 | - if (!empty($recip)) |
|
172 | - if ( sendEmailWarn($tplfile,'[email protected]',$recip, |
|
173 | - $subject,$value,"$quantity $unit",$reason) ) |
|
174 | - syslog(LOG_INFO, "$user: \"$recip\" was notified about the \"$value\" abuse."); |
|
175 | - } |
|
176 | - else syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent."); |
|
177 | - } |
|
178 | - } |
|
179 | - } |
|
180 | - } |
|
181 | - else { |
|
182 | - $reason .= " But it has NOT been listed because it doesn't apply to the trigger condition."; |
|
183 | - syslog (LOG_INFO, "$user: ".$reason); |
|
184 | - } |
|
157 | + $quantity = $conf['quantity']; |
|
158 | + $reason = 'On ['.$tolist["$value"][0]."] <$value> sent ".$tolist["$value"][1].' messages to '.$tolist["$value"][2].' recipients.'; |
|
159 | + if ( $tolist["$value"][3] >= $threshold ) { |
|
160 | + if ( searchAndList ($mysqli,$user,$tables,$typedesc,$value,$unit,$quantity,$reason) ) { |
|
161 | + syslog (LOG_INFO, "$user: ".'Listing reason: '.$reason); |
|
162 | + /* Send a email to domain admin if you list an email */ |
|
163 | + if ( ( $tables["$typedesc"]['field'] == 'email' ) OR ( $tables["$typedesc"]['field'] == 'username' ) ) { |
|
164 | + /* Sometime uid are in the form of <user>@<domain> ... */ |
|
165 | + if ( strpos($value, '@') !== FALSE ) { |
|
166 | + $domain = substr(strrchr($value, '@'), 1); |
|
167 | + if ( strpos($domain, '@') === FALSE ) { |
|
168 | + $recip = emailToNotify($domainNotify_file,$domain); |
|
169 | + $subject = sprintf('%s <%s> is now blocked because exceedes limits on outgoing emails', |
|
170 | + $tables["$typedesc"]['field'], $value); |
|
171 | + if (!empty($recip)) |
|
172 | + if ( sendEmailWarn($tplfile,'[email protected]',$recip, |
|
173 | + $subject,$value,"$quantity $unit",$reason) ) |
|
174 | + syslog(LOG_INFO, "$user: \"$recip\" was notified about the \"$value\" abuse."); |
|
175 | + } |
|
176 | + else syslog(LOG_ERR,"$user: <$domain> contains the '@' char. Notification cannot be sent."); |
|
177 | + } |
|
178 | + } |
|
179 | + } |
|
180 | + } |
|
181 | + else { |
|
182 | + $reason .= " But it has NOT been listed because it doesn't apply to the trigger condition."; |
|
183 | + syslog (LOG_INFO, "$user: ".$reason); |
|
184 | + } |
|
185 | 185 | } |
186 | 186 | |
187 | 187 | /* Close connection */ |
@@ -4,8 +4,8 @@ discard block |
||
4 | 4 | |
5 | 5 | function username() { |
6 | 6 | if (isset ($_SERVER['REMOTE_USER'])) $user = $_SERVER['REMOTE_USER']; |
7 | - else if (isset ($_SERVER['USER'])) $user = $_SERVER['USER']; |
|
8 | - else $user='unknown'; |
|
7 | + else if (isset ($_SERVER['USER'])) $user = $_SERVER['USER']; |
|
8 | + else $user='unknown'; |
|
9 | 9 | return $user; |
10 | 10 | } |
11 | 11 | |
@@ -21,11 +21,11 @@ discard block |
||
21 | 21 | } |
22 | 22 | |
23 | 23 | function myConnect($host, $user, $pass, $db, $port, $tablelist, $typedesc, $loguser) { |
24 | - $db = ( $tablelist["$typedesc"]['milter'] ) ? $tablelist["$typedesc"]['name'] : $db; |
|
24 | + $db = ( $tablelist["$typedesc"]['milter'] ) ? $tablelist["$typedesc"]['name'] : $db; |
|
25 | 25 | $mysqli = new mysqli($host, $user, $pass, $db, $port); |
26 | - if ($mysqli->connect_error) { |
|
27 | - syslog (LOG_EMERG, $loguser.': Connect Error to DB <'.$db.'> (' . $mysqli->connect_errno . ') ' |
|
28 | - . $mysqli->connect_error); |
|
26 | + if ($mysqli->connect_error) { |
|
27 | + syslog (LOG_EMERG, $loguser.': Connect Error to DB <'.$db.'> (' . $mysqli->connect_errno . ') ' |
|
28 | + . $mysqli->connect_error); |
|
29 | 29 | return FALSE; |
30 | 30 | } |
31 | 31 | syslog(LOG_INFO, $loguser.': Successfully MySQL connected at DB <'.$db.'> to ' . $mysqli->host_info) ; |
@@ -66,7 +66,7 @@ discard block |
||
66 | 66 | } |
67 | 67 | } |
68 | 68 | list($sub['net'],$sub['mask'])=explode('/',$value); |
69 | - $query= sprintf("INSERT INTO `$table` ( |
|
69 | + $query= sprintf("INSERT INTO `$table` ( |
|
70 | 70 | `$type` , |
71 | 71 | `netmask`, |
72 | 72 | `date` , |
@@ -79,10 +79,10 @@ discard block |
||
79 | 79 | INET_ATON( '%s' ) , INET_ATON( '%s' ) , |
80 | 80 | CURRENT_TIMESTAMP , TIMESTAMPADD(%s,%d,CURRENT_TIMESTAMP), '1', '%s', '%s' |
81 | 81 | )" ,$sub['net'],$sub['mask'],$expUnit,$expQ,$user,$myreason); |
82 | - break; |
|
82 | + break; |
|
83 | 83 | |
84 | 84 | default: |
85 | - $query= sprintf("INSERT INTO `$table` ( |
|
85 | + $query= sprintf("INSERT INTO `$table` ( |
|
86 | 86 | `$type` , |
87 | 87 | `date` , |
88 | 88 | `exp` , |
@@ -97,8 +97,8 @@ discard block |
||
97 | 97 | } |
98 | 98 | |
99 | 99 | if ($myconn->query($query) === TRUE) { |
100 | - syslog(LOG_INFO, "$user: $type <$value> successfully listed on <$table> for $expQ $expUnit."); |
|
101 | - $result=TRUE; |
|
100 | + syslog(LOG_INFO, "$user: $type <$value> successfully listed on <$table> for $expQ $expUnit."); |
|
101 | + $result=TRUE; |
|
102 | 102 | } |
103 | 103 | else syslog(LOG_ERR, "$user: Error: ".$myconn->error); |
104 | 104 | return $result; |
@@ -116,9 +116,9 @@ discard block |
||
116 | 116 | $nlist = '`nlist` + 1'; |
117 | 117 | } |
118 | 118 | |
119 | - switch ($type) { |
|
119 | + switch ($type) { |
|
120 | 120 | case 'ip': |
121 | - $query= sprintf("UPDATE `$table` SET |
|
121 | + $query= sprintf("UPDATE `$table` SET |
|
122 | 122 | `active` = '1', |
123 | 123 | `user` = '%s', |
124 | 124 | `exp` = TIMESTAMPADD(%s,%d,%s), |
@@ -126,9 +126,9 @@ discard block |
||
126 | 126 | `reason` = '%s' |
127 | 127 | WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$value); |
128 | 128 | break; |
129 | - case 'network': |
|
129 | + case 'network': |
|
130 | 130 | list($sub['net'],$sub['mask'])=explode('/',$value); |
131 | - $query= sprintf("UPDATE `$table` SET |
|
131 | + $query= sprintf("UPDATE `$table` SET |
|
132 | 132 | `active` = '1', |
133 | 133 | `user` = '%s', |
134 | 134 | `exp` = TIMESTAMPADD(%s,%d,%s), |
@@ -137,7 +137,7 @@ discard block |
||
137 | 137 | WHERE (`$table`.`$type` = INET_ATON('%s') AND `$table`.`netmask` = INET_ATON('%s')) LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$sub['net'],$sub['mask']); |
138 | 138 | break; |
139 | 139 | default: |
140 | - $query= sprintf("UPDATE `$table` SET |
|
140 | + $query= sprintf("UPDATE `$table` SET |
|
141 | 141 | `active` = '1', |
142 | 142 | `user` = '%s', |
143 | 143 | `exp` = TIMESTAMPADD(%s,%d,%s), |
@@ -146,18 +146,18 @@ discard block |
||
146 | 146 | WHERE `$table`.`$type` = '%s' LIMIT 1" ,$user,$expUnit,$expQ,$exptime,$nlist,$myreason,$value); |
147 | 147 | } |
148 | 148 | |
149 | - if ($myconn->query($query) === TRUE) { |
|
150 | - syslog(LOG_INFO, "$user: relist $type <$value> on <$table> for $expQ $expUnit from $exptime."); |
|
149 | + if ($myconn->query($query) === TRUE) { |
|
150 | + syslog(LOG_INFO, "$user: relist $type <$value> on <$table> for $expQ $expUnit from $exptime."); |
|
151 | 151 | $result=TRUE; |
152 | - } |
|
153 | - else syslog (LOG_ERR, "$user: Error: ". $myconn->error); |
|
152 | + } |
|
153 | + else syslog (LOG_ERR, "$user: Error: ". $myconn->error); |
|
154 | 154 | return $result; |
155 | 155 | } |
156 | 156 | |
157 | 157 | function remove ($myconn,$user,$value,$type,$table) { |
158 | 158 | |
159 | - switch ($type) { |
|
160 | - case 'ip': |
|
159 | + switch ($type) { |
|
160 | + case 'ip': |
|
161 | 161 | $query = sprintf("DELETE FROM `$table` WHERE |
162 | 162 | `$table`.`$type` = INET_ATON('%s') LIMIT 1", $value); |
163 | 163 | break; |
@@ -173,18 +173,18 @@ discard block |
||
173 | 173 | } |
174 | 174 | |
175 | 175 | |
176 | - if ($return=$myconn->query($query) === TRUE) |
|
177 | - syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>."); |
|
178 | - else syslog(LOG_ERR, "$user: Error: ". $myconn->error); |
|
176 | + if ($return=$myconn->query($query) === TRUE) |
|
177 | + syslog(LOG_INFO, "$user: permanently DELETED $type <$value> from <$table>."); |
|
178 | + else syslog(LOG_ERR, "$user: Error: ". $myconn->error); |
|
179 | 179 | |
180 | - return $return; |
|
180 | + return $return; |
|
181 | 181 | } |
182 | 182 | |
183 | 183 | |
184 | 184 | function changestatus ($myconn,$user,$value,$status,$type,$table) { |
185 | 185 | |
186 | 186 | switch ($type) { |
187 | - case 'ip': |
|
187 | + case 'ip': |
|
188 | 188 | $query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = INET_ATON('%s') LIMIT 1" ,$user, $value); |
189 | 189 | break; |
190 | 190 | case 'network': |
@@ -195,16 +195,16 @@ discard block |
||
195 | 195 | $query= sprintf("UPDATE `$table` SET `active` = '$status', `user` = '%s' WHERE `$table`.`$type` = '%s' LIMIT 1" ,$user, $value); |
196 | 196 | } |
197 | 197 | |
198 | - if ($return=$myconn->query($query) === TRUE) { |
|
199 | - syslog(LOG_INFO, "$user: change status of $type <$value>. The status is now <$status>"); |
|
200 | - } |
|
201 | - else syslog(LOG_ERR, "$user: Error: ". $myconn->error); |
|
198 | + if ($return=$myconn->query($query) === TRUE) { |
|
199 | + syslog(LOG_INFO, "$user: change status of $type <$value>. The status is now <$status>"); |
|
200 | + } |
|
201 | + else syslog(LOG_ERR, "$user: Error: ". $myconn->error); |
|
202 | 202 | return $return; |
203 | 203 | } |
204 | 204 | |
205 | 205 | |
206 | 206 | function expire ($myconn,$user,$tables,$expireTime) { |
207 | - $return=TRUE; |
|
207 | + $return=TRUE; |
|
208 | 208 | $log=array(); |
209 | 209 | $desc = array_keys($tables); |
210 | 210 | foreach ($desc as $tdesc) { |
@@ -214,11 +214,11 @@ discard block |
||
214 | 214 | /* END OF QUERY */ |
215 | 215 | $log[0] = 'expired for'; |
216 | 216 | $log[1] = 'disabled for'; |
217 | - if ($myconn->multi_query($query)) { |
|
217 | + if ($myconn->multi_query($query)) { |
|
218 | 218 | $j = 0; |
219 | 219 | do { |
220 | - $numdel = $myconn->affected_rows; |
|
221 | - syslog(LOG_INFO, "Expire job - <$user> Permanently DELETED $numdel records ".$log[$j]." $expireTime YEARS from <".$tables["$tdesc"]['name'].'>.'); |
|
220 | + $numdel = $myconn->affected_rows; |
|
221 | + syslog(LOG_INFO, "Expire job - <$user> Permanently DELETED $numdel records ".$log[$j]." $expireTime YEARS from <".$tables["$tdesc"]['name'].'>.'); |
|
222 | 222 | $j++; |
223 | 223 | |
224 | 224 | } while ($myconn->next_result()); |
@@ -230,7 +230,7 @@ discard block |
||
230 | 230 | } |
231 | 231 | if ( !($return) ) syslog(LOG_EMERG, 'End of Expire job with error. See above logs. SQL Connection terminated'); |
232 | 232 | else syslog(LOG_INFO, 'Successfully End of Expire job. SQL Connection successfully terminated.'); |
233 | - return $return; |
|
233 | + return $return; |
|
234 | 234 | } |
235 | 235 | |
236 | 236 | |
@@ -303,7 +303,7 @@ discard block |
||
303 | 303 | if ( $entry->num_rows ) { |
304 | 304 | if ( $entry->num_rows == 1 ) { |
305 | 305 | $riga = $entry->fetch_array(MYSQLI_ASSOC); |
306 | - if (isListed($riga)) { |
|
306 | + if (isListed($riga)) { |
|
307 | 307 | $warn = "<$value> is already present in <$listdep> list!"; |
308 | 308 | $entry->free(); |
309 | 309 | return FALSE; |
@@ -320,7 +320,7 @@ discard block |
||
320 | 320 | function searchentry ($myconn,$value,$tablelist) { |
321 | 321 | /* Make a MYSQL query and return result */ |
322 | 322 | |
323 | - $type = $tablelist['field']; |
|
323 | + $type = $tablelist['field']; |
|
324 | 324 | |
325 | 325 | if ( $tablelist['milter'] ) { |
326 | 326 | $table = milterTable($type); |
@@ -344,7 +344,7 @@ discard block |
||
344 | 344 | case 'ip': |
345 | 345 | $query = sprintf('SELECT * FROM ( |
346 | 346 | SELECT *, GROUP_CONCAT(milt.name) as miltnames FROM `%s` LEFT JOIN milt ON (%s.idmilt=milt.id)' . |
347 | - 'WHERE `ip` = INET_ATON(\'%s\') |
|
347 | + 'WHERE `ip` = INET_ATON(\'%s\') |
|
348 | 348 | ) AS val WHERE val.ip IS NOT null', $table, $table, $value); |
349 | 349 | break; |
350 | 350 | default: |
@@ -355,33 +355,33 @@ discard block |
||
355 | 355 | } |
356 | 356 | |
357 | 357 | else { |
358 | - $table = $tablelist['name']; |
|
359 | - if ($value == 'ALL') $query = 'select * from '.$table; |
|
360 | - else { |
|
361 | - switch ($type) { |
|
362 | - case 'ip': |
|
363 | - $query= "select * from $table where $type = INET_ATON('$value')"; |
|
364 | - break; |
|
365 | - case 'network': |
|
366 | - list($sub['net'],$sub['mask'])=explode('/',$value); |
|
367 | - $query= sprintf('select * from `%s` |
|
358 | + $table = $tablelist['name']; |
|
359 | + if ($value == 'ALL') $query = 'select * from '.$table; |
|
360 | + else { |
|
361 | + switch ($type) { |
|
362 | + case 'ip': |
|
363 | + $query= "select * from $table where $type = INET_ATON('$value')"; |
|
364 | + break; |
|
365 | + case 'network': |
|
366 | + list($sub['net'],$sub['mask'])=explode('/',$value); |
|
367 | + $query= sprintf('select * from `%s` |
|
368 | 368 | WHERE ( |
369 | 369 | inet_aton(\'%s\') >= network AND |
370 | 370 | ( inet_aton(\'%s\') | ( inet_aton(\'%s\') ^ (power(2,32)-1) ) ) |
371 | 371 | <= network | ( netmask ^ (power(2,32)-1) ) |
372 | 372 | )', $table, $sub['net'], $sub['net'], $sub['mask']); |
373 | 373 | ; |
374 | - break; |
|
375 | - default: |
|
376 | - $query= "select * from $table where $type = '$value'"; |
|
377 | - } |
|
378 | - } |
|
374 | + break; |
|
375 | + default: |
|
376 | + $query= "select * from $table where $type = '$value'"; |
|
377 | + } |
|
378 | + } |
|
379 | 379 | } |
380 | 380 | |
381 | 381 | $result = $myconn->query($query); |
382 | 382 | if($result === false) |
383 | 383 | syslog(LOG_EMERG, "ALERT: Query <$query> failed: ".$myconn->error); |
384 | - return $result; |
|
384 | + return $result; |
|
385 | 385 | } |
386 | 386 | |
387 | 387 | function countListed ($myconn,$table) { |
@@ -396,14 +396,14 @@ discard block |
||
396 | 396 | |
397 | 397 | |
398 | 398 | function isFull($myconn,$typedesc,$alltables) { |
399 | - if (isset($alltables["$typedesc"]['limit'])) { |
|
399 | + if (isset($alltables["$typedesc"]['limit'])) { |
|
400 | 400 | if ( $alltables["$typedesc"]['milter'] ) |
401 | 401 | $tab = 'net'; |
402 | 402 | else |
403 | 403 | $tab = $alltables["$typedesc"]['name']; |
404 | - if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) |
|
405 | - return TRUE; |
|
406 | - } |
|
404 | + if ( countListed($myconn,$tab) >= $alltables["$typedesc"]['limit'] ) |
|
405 | + return TRUE; |
|
406 | + } |
|
407 | 407 | return FALSE; |
408 | 408 | } |
409 | 409 | |
@@ -423,14 +423,14 @@ discard block |
||
423 | 423 | if ($result) { |
424 | 424 | printf("<pre>Your request for $type <$value> returned %d items.\n</pre>", $result->num_rows); |
425 | 425 | |
426 | - /* Check for limit in number of listed items */ |
|
426 | + /* Check for limit in number of listed items */ |
|
427 | 427 | $full = isFull($myconn,$typedesc,$tables); |
428 | 428 | if ($full) print '<p>'.htmlspecialchars("$typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items.').'</p>'; |
429 | 429 | |
430 | 430 | if ($result->num_rows) { |
431 | 431 | print $tabhtm; |
432 | 432 | $i=0; |
433 | - while ($riga = $result->fetch_array(MYSQLI_ASSOC)) { |
|
433 | + while ($riga = $result->fetch_array(MYSQLI_ASSOC)) { |
|
434 | 434 | if (isListed($riga)) { |
435 | 435 | if ($tables["$typedesc"]['bl']) $listed='Listed'; |
436 | 436 | else $listed='WhiteListed'; |
@@ -456,7 +456,7 @@ discard block |
||
456 | 456 | printf ("<tr id=id$i><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td id='status$listed'>%s</td><td>%s</td></tr>\n", |
457 | 457 | $element, $riga['date'], $riga['datemod'], $riga['exp'], $riga['active'], $riga['nlist'], $riga['user'],htmlspecialchars($riga['reason']),ask($myconn,$i,$listed,$tables,$typedesc,$element,$full,$user,$adm)); |
458 | 458 | $i++; |
459 | - } |
|
459 | + } |
|
460 | 460 | print '</tbody></table>'; |
461 | 461 | } |
462 | 462 | else { |
@@ -476,15 +476,15 @@ discard block |
||
476 | 476 | |
477 | 477 | function sendEmailWarn($tplf,$from,$to,$sbj,$emailListed,$intervalToExpire,$detail) { |
478 | 478 | $now = time(); |
479 | - setlocale (LC_TIME, 'it_IT'); |
|
480 | - $date = date("r",$now); |
|
479 | + setlocale (LC_TIME, 'it_IT'); |
|
480 | + $date = date("r",$now); |
|
481 | 481 | $messageID = md5(uniqid($now,1)) . '@' . gethostname(); |
482 | 482 | $mua = 'PHP/' . phpversion(); |
483 | 483 | |
484 | 484 | /* Parsing headers */ |
485 | 485 | if (!file_exists($tplf['header'])) { |
486 | - syslog(LOG_ERR, 'Sending email... template file <'.$tplf['header'].'> not found!'); |
|
487 | - exit; |
|
486 | + syslog(LOG_ERR, 'Sending email... template file <'.$tplf['header'].'> not found!'); |
|
487 | + exit; |
|
488 | 488 | } |
489 | 489 | |
490 | 490 | $head_tmpl = file_get_contents($tplf['header']); |
@@ -493,35 +493,35 @@ discard block |
||
493 | 493 | $headers = str_replace($arr_tpl_vars, $arr_tpl_data, $head_tmpl); |
494 | 494 | $headers = preg_replace( '/\r|\n/', "\r\n", $headers ); |
495 | 495 | |
496 | - /* Parsing body */ |
|
496 | + /* Parsing body */ |
|
497 | 497 | |
498 | - if (!file_exists($tplf['body'])) { |
|
499 | - syslog(LOG_ERR, 'Sending email... template file <'.$tplf['body'].'> not found!'); |
|
500 | - exit; |
|
501 | - } |
|
498 | + if (!file_exists($tplf['body'])) { |
|
499 | + syslog(LOG_ERR, 'Sending email... template file <'.$tplf['body'].'> not found!'); |
|
500 | + exit; |
|
501 | + } |
|
502 | 502 | |
503 | - $body_tmpl = file_get_contents($tplf['body']); |
|
504 | - $arr_tpl_vars = array('{emailListed}','{expInterval}','{reason}'); |
|
505 | - $arr_tpl_data = array($emailListed,$intervalToExpire,$detail); |
|
506 | - $body = str_replace($arr_tpl_vars, $arr_tpl_data, $body_tmpl); |
|
507 | - $body = preg_replace( "/\r|\n/", "\r\n", $body ); |
|
503 | + $body_tmpl = file_get_contents($tplf['body']); |
|
504 | + $arr_tpl_vars = array('{emailListed}','{expInterval}','{reason}'); |
|
505 | + $arr_tpl_data = array($emailListed,$intervalToExpire,$detail); |
|
506 | + $body = str_replace($arr_tpl_vars, $arr_tpl_data, $body_tmpl); |
|
507 | + $body = preg_replace( "/\r|\n/", "\r\n", $body ); |
|
508 | 508 | $body = wordwrap ( $body, 75 , "\r\n" ); |
509 | 509 | |
510 | 510 | /* Send the mail! */ |
511 | - if ( strlen(ini_get("safe_mode"))< 1) { |
|
512 | - $old_mailfrom = ini_get("sendmail_from"); |
|
513 | - ini_set("sendmail_from", $from); |
|
514 | - $params = sprintf("-oi -f %s", '<>'); |
|
515 | - if (!(mail($to,$sbj, $body,$headers,$params))) $flag=FALSE; |
|
516 | - else $flag=TRUE; |
|
517 | - if (isset($old_mailfrom)) |
|
518 | - ini_set("sendmail_from", $old_mailfrom); |
|
519 | - } |
|
520 | - else { |
|
521 | - if (!(mail($to,$sbj, $body,$headers))) $flag=FALSE; |
|
522 | - else $flag=TRUE; |
|
523 | - } |
|
524 | - return $flag; |
|
511 | + if ( strlen(ini_get("safe_mode"))< 1) { |
|
512 | + $old_mailfrom = ini_get("sendmail_from"); |
|
513 | + ini_set("sendmail_from", $from); |
|
514 | + $params = sprintf("-oi -f %s", '<>'); |
|
515 | + if (!(mail($to,$sbj, $body,$headers,$params))) $flag=FALSE; |
|
516 | + else $flag=TRUE; |
|
517 | + if (isset($old_mailfrom)) |
|
518 | + ini_set("sendmail_from", $old_mailfrom); |
|
519 | + } |
|
520 | + else { |
|
521 | + if (!(mail($to,$sbj, $body,$headers))) $flag=FALSE; |
|
522 | + else $flag=TRUE; |
|
523 | + } |
|
524 | + return $flag; |
|
525 | 525 | } |
526 | 526 | |
527 | 527 | function emailToNotify($notify_file,$dom) { |
@@ -535,62 +535,62 @@ discard block |
||
535 | 535 | function searchAndList ($myconn,$loguser,$tables,$typedesc,$value,$unit,&$quantity,&$reason) { |
536 | 536 | |
537 | 537 | /* Search and list value */ |
538 | - $type = $tables["$typedesc"]['field']; |
|
539 | - $table = $tables["$typedesc"]['name']; |
|
540 | - $result = searchentry ($myconn,$value,$tables["$typedesc"]); |
|
541 | - |
|
542 | - /* Manage abnormal conditions */ |
|
543 | - /* Value already present in db more than once. This is absurd. Panic! */ |
|
544 | - if ($result->num_rows > 1) { |
|
545 | - syslog(LOG_EMERG,"$loguser: PANIC! Select for $type '$value' returned ". $result->num_rows ." items instead of one. Abnormal. Contact a sysadmin or a developer."); |
|
546 | - $result->free(); |
|
547 | - return FALSE; |
|
548 | - } |
|
538 | + $type = $tables["$typedesc"]['field']; |
|
539 | + $table = $tables["$typedesc"]['name']; |
|
540 | + $result = searchentry ($myconn,$value,$tables["$typedesc"]); |
|
541 | + |
|
542 | + /* Manage abnormal conditions */ |
|
543 | + /* Value already present in db more than once. This is absurd. Panic! */ |
|
544 | + if ($result->num_rows > 1) { |
|
545 | + syslog(LOG_EMERG,"$loguser: PANIC! Select for $type '$value' returned ". $result->num_rows ." items instead of one. Abnormal. Contact a sysadmin or a developer."); |
|
546 | + $result->free(); |
|
547 | + return FALSE; |
|
548 | + } |
|
549 | 549 | |
550 | - /* Value already present in db or not present: to list anyway */ |
|
551 | - if ($result->num_rows >= 0) { |
|
552 | - /* First, check for limit in number of listed items */ |
|
553 | - if (isFull($myconn,$typedesc,$tables)) { |
|
554 | - syslog(LOG_EMERG,"$loguser: $typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items. Abnormal exit.'); |
|
555 | - $result->free(); |
|
556 | - return FALSE; |
|
557 | - } |
|
558 | - /* Second, check if the (re)list would be consistent now */ |
|
559 | - if (! consistentListing($myconn,$tables,$typedesc,$value,$whynot) ) { |
|
560 | - syslog(LOG_ERR, $loguser.': '.$whynot); |
|
561 | - $result->free(); |
|
562 | - return FALSE; |
|
563 | - } |
|
564 | - } |
|
565 | - /* End of abnormal conditions */ |
|
550 | + /* Value already present in db or not present: to list anyway */ |
|
551 | + if ($result->num_rows >= 0) { |
|
552 | + /* First, check for limit in number of listed items */ |
|
553 | + if (isFull($myconn,$typedesc,$tables)) { |
|
554 | + syslog(LOG_EMERG,"$loguser: $typedesc has reached maximum value of ".$tables["$typedesc"]['limit'].' listed items. Abnormal exit.'); |
|
555 | + $result->free(); |
|
556 | + return FALSE; |
|
557 | + } |
|
558 | + /* Second, check if the (re)list would be consistent now */ |
|
559 | + if (! consistentListing($myconn,$tables,$typedesc,$value,$whynot) ) { |
|
560 | + syslog(LOG_ERR, $loguser.': '.$whynot); |
|
561 | + $result->free(); |
|
562 | + return FALSE; |
|
563 | + } |
|
564 | + } |
|
565 | + /* End of abnormal conditions */ |
|
566 | 566 | |
567 | 567 | |
568 | - /* Finally, here I can list the value! */ |
|
568 | + /* Finally, here I can list the value! */ |
|
569 | 569 | $thisentry = $result->fetch_array(MYSQLI_ASSOC); |
570 | - switch ($result->num_rows) { |
|
571 | - /* Relist value if already present */ |
|
572 | - case 1: |
|
573 | - if ( isListed($thisentry) ) { |
|
570 | + switch ($result->num_rows) { |
|
571 | + /* Relist value if already present */ |
|
572 | + case 1: |
|
573 | + if ( isListed($thisentry) ) { |
|
574 | 574 | /* Entry already listed */ |
575 | 575 | $expdate = $thisentry['exp']; |
576 | 576 | $reason = sprintf('%s. Already listed. Adding 1 DAY to previous expire date.', |
577 | 577 | $reason); |
578 | 578 | $quantity = 1; |
579 | 579 | $unit = 'DAY'; |
580 | - } |
|
580 | + } |
|
581 | 581 | else { |
582 | - /* Entry delisted */ |
|
582 | + /* Entry delisted */ |
|
583 | 583 | $quantity *= $thisentry['nlist']; |
584 | 584 | $expdate = 0; /* This forces expiration from CURRENT_TIMESTAMP */ |
585 | 585 | } |
586 | 586 | $result->free(); |
587 | - return relist ($myconn,$loguser,$value,$type,$table,$unit,$quantity,$reason, $expdate); |
|
587 | + return relist ($myconn,$loguser,$value,$type,$table,$unit,$quantity,$reason, $expdate); |
|
588 | 588 | |
589 | - /* First time list value */ |
|
590 | - case 0: |
|
591 | - $result->free(); |
|
592 | - return addtolist ($myconn,$loguser,$value,$tables["$typedesc"],$unit,$quantity,$reason,$_); |
|
593 | - } |
|
589 | + /* First time list value */ |
|
590 | + case 0: |
|
591 | + $result->free(); |
|
592 | + return addtolist ($myconn,$loguser,$value,$tables["$typedesc"],$unit,$quantity,$reason,$_); |
|
593 | + } |
|
594 | 594 | } |
595 | 595 | |
596 | 596 | |
@@ -623,7 +623,7 @@ discard block |
||
623 | 623 | return FALSE; |
624 | 624 | } |
625 | 625 | $result = searchentry ($myconn,'ALL',$tabletype); |
626 | - if ($result->num_rows) { |
|
626 | + if ($result->num_rows) { |
|
627 | 627 | while ($row = $result->fetch_array(MYSQLI_ASSOC)) { |
628 | 628 | $thisNet = long2ip($row['network']).'/'.long2ip($row['netmask']); |
629 | 629 | if ( isIn($thisNet, $net) ) { |
@@ -643,7 +643,7 @@ discard block |
||
643 | 643 | /* For miltermap */ |
644 | 644 | function checkMilterConf($table) { |
645 | 645 | if (isset($table['milter'])) { |
646 | - if ($table['milter'] === TRUE) { |
|
646 | + if ($table['milter'] === TRUE) { |
|
647 | 647 | switch ( $table['field'] ) { |
648 | 648 | case 'network': |
649 | 649 | case 'ip': |
@@ -666,15 +666,15 @@ discard block |
||
666 | 666 | |
667 | 667 | function milterTable($t) { |
668 | 668 | /* Return the milter object table for type t or FALSE on error */ |
669 | - switch ($t) { |
|
670 | - case 'network': |
|
671 | - return 'net'; |
|
672 | - case 'ip': |
|
673 | - return 'ips'; |
|
674 | - default: |
|
669 | + switch ($t) { |
|
670 | + case 'network': |
|
671 | + return 'net'; |
|
672 | + case 'ip': |
|
673 | + return 'ips'; |
|
674 | + default: |
|
675 | 675 | syslog(LOG_EMERG, "ALERT: type <$t> not allowed in configuration. "); |
676 | - return FALSE; |
|
677 | - } |
|
676 | + return FALSE; |
|
677 | + } |
|
678 | 678 | } |
679 | 679 | |
680 | 680 | |
@@ -682,9 +682,9 @@ discard block |
||
682 | 682 | $milters=array(); |
683 | 683 | $query = 'SELECT `name` FROM `config`'; |
684 | 684 | |
685 | - $result = $myconn->query($query); |
|
686 | - if($result === false) { |
|
687 | - syslog(LOG_EMERG, "$loguser: ALERT: Query <$query> failed: ".$myconn->error); |
|
685 | + $result = $myconn->query($query); |
|
686 | + if($result === false) { |
|
687 | + syslog(LOG_EMERG, "$loguser: ALERT: Query <$query> failed: ".$myconn->error); |
|
688 | 688 | return FALSE; |
689 | 689 | } |
690 | 690 | if ($result->num_rows) { |
@@ -754,21 +754,21 @@ discard block |
||
754 | 754 | |
755 | 755 | function curl_get($url, array $get = NULL, array $options = array(), $loguser) |
756 | 756 | { |
757 | - $defaults = array( |
|
758 | - CURLOPT_URL => $url. (strpos($url, '?') === FALSE ? '?' : ''). http_build_query($get), |
|
759 | - CURLOPT_HEADER => 0, |
|
760 | - CURLOPT_RETURNTRANSFER => TRUE, |
|
761 | - CURLOPT_TIMEOUT => 4 |
|
762 | - ); |
|
763 | - |
|
764 | - $ch = curl_init(); |
|
765 | - curl_setopt_array($ch, ($options + $defaults)); |
|
766 | - if( ! $result = curl_exec($ch)) |
|
767 | - { |
|
768 | - syslog(LOG_ERR, sprintf('%s: CURL Error: <%s>', $loguser, curl_error($ch))); |
|
769 | - } |
|
770 | - curl_close($ch); |
|
771 | - return $result; |
|
757 | + $defaults = array( |
|
758 | + CURLOPT_URL => $url. (strpos($url, '?') === FALSE ? '?' : ''). http_build_query($get), |
|
759 | + CURLOPT_HEADER => 0, |
|
760 | + CURLOPT_RETURNTRANSFER => TRUE, |
|
761 | + CURLOPT_TIMEOUT => 4 |
|
762 | + ); |
|
763 | + |
|
764 | + $ch = curl_init(); |
|
765 | + curl_setopt_array($ch, ($options + $defaults)); |
|
766 | + if( ! $result = curl_exec($ch)) |
|
767 | + { |
|
768 | + syslog(LOG_ERR, sprintf('%s: CURL Error: <%s>', $loguser, curl_error($ch))); |
|
769 | + } |
|
770 | + curl_close($ch); |
|
771 | + return $result; |
|
772 | 772 | } |
773 | 773 | |
774 | 774 | /* |
@@ -27,32 +27,32 @@ |
||
27 | 27 | |
28 | 28 | |
29 | 29 | $data = array( |
30 | - 'date' => NULL, |
|
31 | - 'from' => NULL, |
|
32 | - 'messageid' => NULL, |
|
33 | - 'dmarc' => array( |
|
34 | - 'result' => NULL, |
|
35 | - 'dom' => NULL |
|
36 | - ), |
|
37 | - 'spf' => array( |
|
38 | - 'result' => NULL, |
|
39 | - 'dom' => NULL |
|
40 | - ), |
|
41 | - 'dkim' => array( |
|
42 | - 'result' => NULL, |
|
43 | - 'dom' => NULL |
|
44 | - ), |
|
45 | - 'spam' => array( |
|
46 | - 'status' => NULL, |
|
47 | - 'score' => NULL, |
|
48 | - 'th' => NULL, |
|
49 | - ), |
|
50 | - 'dspam' => array( |
|
51 | - 'type' => NULL, |
|
52 | - 'level' => NULL, |
|
53 | - 'learn' => NULL |
|
54 | - ), |
|
55 | - 'warn' => NULL |
|
30 | + 'date' => NULL, |
|
31 | + 'from' => NULL, |
|
32 | + 'messageid' => NULL, |
|
33 | + 'dmarc' => array( |
|
34 | + 'result' => NULL, |
|
35 | + 'dom' => NULL |
|
36 | + ), |
|
37 | + 'spf' => array( |
|
38 | + 'result' => NULL, |
|
39 | + 'dom' => NULL |
|
40 | + ), |
|
41 | + 'dkim' => array( |
|
42 | + 'result' => NULL, |
|
43 | + 'dom' => NULL |
|
44 | + ), |
|
45 | + 'spam' => array( |
|
46 | + 'status' => NULL, |
|
47 | + 'score' => NULL, |
|
48 | + 'th' => NULL, |
|
49 | + ), |
|
50 | + 'dspam' => array( |
|
51 | + 'type' => NULL, |
|
52 | + 'level' => NULL, |
|
53 | + 'learn' => NULL |
|
54 | + ), |
|
55 | + 'warn' => NULL |
|
56 | 56 | ); |
57 | 57 | |
58 | 58 | if (empty($folder)) exit ('<p>No folder found.</p>'); /* This should not occur */ |
@@ -16,10 +16,10 @@ |
||
16 | 16 | require_once('function.php'); |
17 | 17 | |
18 | 18 | if ( !isset($version) ) { |
19 | - openlog('mailClassifierEmergency', LOG_PID, LOG_LOCAL0); |
|
20 | - syslog (LOG_EMERG, sprintf('unknown: I can\'t read the config files. Do you have configured the $path in %s?', __FILE__)); |
|
21 | - closelog(); |
|
22 | - exit(255); |
|
19 | + openlog('mailClassifierEmergency', LOG_PID, LOG_LOCAL0); |
|
20 | + syslog (LOG_EMERG, sprintf('unknown: I can\'t read the config files. Do you have configured the $path in %s?', __FILE__)); |
|
21 | + closelog(); |
|
22 | + exit(255); |
|
23 | 23 | } |
24 | 24 | |
25 | 25 | checkSSL(); |
@@ -15,7 +15,7 @@ |
||
15 | 15 | if (is_array($folders)) { |
16 | 16 | print '<option value="" selected disabled>Choose a folder</option>'; |
17 | 17 | foreach ( $folders as $folder ) |
18 | - printf('<option value="%s">%s</option>', |
|
18 | + printf('<option value="%s">%s</option>', |
|
19 | 19 | $folder, |
20 | 20 | htmlspecialchars(mb_convert_encoding($folder, "UTF-8", "UTF7-IMAP"))); |
21 | 21 | } |
@@ -3,13 +3,13 @@ discard block |
||
3 | 3 | function imapFolder($cf, $username) { |
4 | 4 | $return = array(); |
5 | 5 | $open='{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}'; |
6 | - $m_mail = imap_open($open, $username, $cf['authpassword'], OP_READONLY) |
|
7 | - or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error()); |
|
8 | - if ( !$m_mail ) exit(254); |
|
6 | + $m_mail = imap_open($open, $username, $cf['authpassword'], OP_READONLY) |
|
7 | + or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error()); |
|
8 | + if ( !$m_mail ) exit(254); |
|
9 | 9 | |
10 | 10 | |
11 | - syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...'); |
|
12 | - //get all folder |
|
11 | + syslog (LOG_INFO,$cf['user'].': Successfully connected to <'.$cf['mailhost'].'>; Listing folders of account <'.$username.'>...'); |
|
12 | + //get all folder |
|
13 | 13 | $list = imap_list($m_mail, $open, "*"); |
14 | 14 | imap_close($m_mail); |
15 | 15 | if (is_array($list)) |
@@ -23,7 +23,7 @@ discard block |
||
23 | 23 | function imapFind ($cf, $username, $folder) { |
24 | 24 | $head=array(); |
25 | 25 | $m_mail = imap_open('{'.$cf['mailhost'].':143/imap/novalidate-cert/authuser='.$cf['authuser'].'}'.$folder, $username,$cf['authpassword'], OP_READONLY) |
26 | - or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error()); |
|
26 | + or syslog (LOG_EMERG, $cf['user'].': Error in IMAP connection to <'.$cf['mailhost'].'>: ' . imap_last_error()); |
|
27 | 27 | if ( !$m_mail ) exit(254); |
28 | 28 | |
29 | 29 | |
@@ -36,12 +36,12 @@ discard block |
||
36 | 36 | // Order results starting from newest message |
37 | 37 | if ( empty($m_search) ) { |
38 | 38 | syslog (LOG_INFO,$cf['user'].": No suitable mail found in <$folder> folder."); |
39 | - if ( $ierr = imap_errors() ) |
|
40 | - foreach ( $ierr as $thiserr ) |
|
41 | - syslog (LOG_ERR, $cf['user'].": IMAP Error: $thiserr"); |
|
42 | - if ( $ierr = imap_alerts() ) |
|
43 | - foreach ( $ierr as $thiserr ) |
|
44 | - syslog (LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr"); |
|
39 | + if ( $ierr = imap_errors() ) |
|
40 | + foreach ( $ierr as $thiserr ) |
|
41 | + syslog (LOG_ERR, $cf['user'].": IMAP Error: $thiserr"); |
|
42 | + if ( $ierr = imap_alerts() ) |
|
43 | + foreach ( $ierr as $thiserr ) |
|
44 | + syslog (LOG_ALERT, $cf['user'].": IMAP Alert: $thiserr"); |
|
45 | 45 | imap_close( $m_mail ); |
46 | 46 | return FALSE; |
47 | 47 | } |
@@ -49,7 +49,7 @@ discard block |
||
49 | 49 | syslog (LOG_INFO,$cf['user'].": Found $nmes mail in <$folder> folder."); |
50 | 50 | if ($nmes>0) rsort($m_search); |
51 | 51 | |
52 | - // loop for each message |
|
52 | + // loop for each message |
|
53 | 53 | foreach ($m_search as $onem) |
54 | 54 | $head[] = imap_fetchheader($m_mail, $onem ); |
55 | 55 | imap_close($m_mail); |
@@ -80,52 +80,52 @@ discard block |
||
80 | 80 | /* Each line must end with /r/n */ |
81 | 81 | |
82 | 82 | $result = array( |
83 | - 'date' => NULL, |
|
84 | - 'from' => NULL, |
|
85 | - 'messageid' => NULL, |
|
83 | + 'date' => NULL, |
|
84 | + 'from' => NULL, |
|
85 | + 'messageid' => NULL, |
|
86 | 86 | 'dmarc' => array( |
87 | 87 | 'result' => NULL, |
88 | 88 | 'dom' => NULL |
89 | 89 | ), |
90 | 90 | 'spf' => array( |
91 | - 'result' => NULL, |
|
92 | - 'dom' => NULL |
|
93 | - ), |
|
91 | + 'result' => NULL, |
|
92 | + 'dom' => NULL |
|
93 | + ), |
|
94 | 94 | 'dkim' => array( |
95 | - 'result' => NULL, |
|
96 | - 'dom' => NULL |
|
97 | - ), |
|
98 | - 'spam' => array( |
|
99 | - 'status' => NULL, |
|
100 | - 'score' => NULL, |
|
101 | - 'th' => NULL, |
|
102 | - ), |
|
103 | - 'dspam' => array( |
|
104 | - 'type' => NULL, |
|
105 | - 'level' => NULL, |
|
95 | + 'result' => NULL, |
|
96 | + 'dom' => NULL |
|
97 | + ), |
|
98 | + 'spam' => array( |
|
99 | + 'status' => NULL, |
|
100 | + 'score' => NULL, |
|
101 | + 'th' => NULL, |
|
102 | + ), |
|
103 | + 'dspam' => array( |
|
104 | + 'type' => NULL, |
|
105 | + 'level' => NULL, |
|
106 | 106 | 'learn' => NULL |
107 | - ), |
|
107 | + ), |
|
108 | 108 | 'warn' => NULL |
109 | - ); |
|
109 | + ); |
|
110 | 110 | |
111 | 111 | |
112 | - if ( preg_match_all ('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dmarc=(?<dmarc>\w+)\s+\(p=\w+\s+dis=\w+\)\s+header\.from=(?<DMARCfrom>[\w\.]+)/m',$header,$received) ) { |
|
112 | + if ( preg_match_all ('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dmarc=(?<dmarc>\w+)\s+\(p=\w+\s+dis=\w+\)\s+header\.from=(?<DMARCfrom>[\w\.]+)/m',$header,$received) ) { |
|
113 | 113 | $k=0; |
114 | - for ($i = count($received[0])-1;$i>=0;$i--) { |
|
115 | - foreach ($ARhosts as $mx) { |
|
114 | + for ($i = count($received[0])-1;$i>=0;$i--) { |
|
115 | + foreach ($ARhosts as $mx) { |
|
116 | 116 | if ($mx == $received['host'][$i]) { |
117 | 117 | /* This is a trusted AR result */ |
118 | 118 | $result['dmarc']['result']=$received['dmarc'][$i]; |
119 | 119 | $result['dmarc']['dom'] = $received['DMARCfrom'][$i]; |
120 | 120 | $k++; |
121 | 121 | } |
122 | - } |
|
122 | + } |
|
123 | + } |
|
123 | 124 | } |
124 | - } |
|
125 | 125 | $received=NULL; |
126 | 126 | if ($k>1) $result['warn'][] = 'The trusted DMARC AR Headers are present more than once. Something wrong.'; |
127 | 127 | |
128 | - if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m',$header,$received) ) { |
|
128 | + if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)spf=(?<spf>\w+)\s+smtp\.(?:mailfrom|helo)=(?<SPFfrom>[\w\.]+)/m',$header,$received) ) { |
|
129 | 129 | $k=0; |
130 | 130 | for ($i = count($received[0])-1;$i>=0;$i--) { |
131 | 131 | foreach ($ARhosts as $mx) { |
@@ -134,25 +134,25 @@ discard block |
||
134 | 134 | $result['spf']['result']=$received['spf'][$i]; |
135 | 135 | $result['spf']['dom'] = $received['SPFfrom'][$i]; |
136 | 136 | $k++; |
137 | - } |
|
138 | - } |
|
139 | - } |
|
137 | + } |
|
138 | + } |
|
139 | + } |
|
140 | 140 | } |
141 | 141 | $received=NULL; |
142 | 142 | if ($k>1) $result['warn'][] = 'The trusted SPF AR Headers are present more than once. Something wrong.'; |
143 | 143 | |
144 | 144 | $k=0; |
145 | - if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m',$header,$received) ) { |
|
145 | + if ( preg_match_all('/^Authentication\-Results:\s+(?<host>[\w\.]+);(?:\s+|\r\n\s+)dkim=(?<dkim>\w+)\s+[\w\s\(\)\-]+header\.d=(?<DKIMdom>[\w\.]+)/m',$header,$received) ) { |
|
146 | 146 | for ($i = count($received[0])-1;$i>=0;$i--) { |
147 | - foreach ($ARhosts as $mx) { |
|
148 | - if ($mx == $received['host'][$i]) { |
|
149 | - /* This is a trusted AR result */ |
|
150 | - $result['dkim']['result']=$received['dkim'][$i]; |
|
151 | - $result['dkim']['dom'] = $received['DKIMdom'][$i]; |
|
147 | + foreach ($ARhosts as $mx) { |
|
148 | + if ($mx == $received['host'][$i]) { |
|
149 | + /* This is a trusted AR result */ |
|
150 | + $result['dkim']['result']=$received['dkim'][$i]; |
|
151 | + $result['dkim']['dom'] = $received['DKIMdom'][$i]; |
|
152 | 152 | $k++; |
153 | - } |
|
154 | - } |
|
155 | - } |
|
153 | + } |
|
154 | + } |
|
155 | + } |
|
156 | 156 | } |
157 | 157 | $received=NULL; |
158 | 158 | if ($k>1) $result['warn'][] = 'The trusted DKIM AR Headers are present more than once. Something wrong.'; |
@@ -160,59 +160,59 @@ discard block |
||
160 | 160 | if ($dpl) { /* Use Spamassassin Plugin */ |
161 | 161 | if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*DSPAM_(?P<dtype>SPAM|HAM)_(?P<dlevel>\d\d)(?:.|\r\n\s+)*\]/m',$header,$received) ) { |
162 | 162 | $result['spam']['status']=$received['spamstatus'][0]; |
163 | - $result['spam']['score'] = $received['score'][0]; |
|
163 | + $result['spam']['score'] = $received['score'][0]; |
|
164 | 164 | $result['spam']['th'] = $received['th'][0]; |
165 | 165 | $result['dspam']['type'] = dspamType($received['dtype'][0]); |
166 | 166 | $result['dspam']['level'] =$received['dlevel'][0]; |
167 | - } |
|
168 | - if (count($received[0])>1) $result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.'; |
|
167 | + } |
|
168 | + if (count($received[0])>1) $result['warn'][] = 'The Spamassassin Headers are present more than once. I consider only the last one.'; |
|
169 | 169 | } |
170 | 170 | else { /* Parse apart all DSPAM Header and calculate a level */ |
171 | 171 | if ( preg_match_all('/^X\-Spam\-Status:\s(?P<spamstatus>\w+)\,(?:\s+|\r\n\s+)score=(?P<score>[\-\.\d]+)(?:\s+|\r\n\s+)tagged_above=\-{0,1}\d+(?:\s+|\r\n\s+)required=(?P<th>[\-\.\d]+)(?:\s+|\r\n\s+)tests=\[(?:.|\r\n\s+)*\]/m',$header,$received) ) { |
172 | - $result['spam']['status']=$received['spamstatus'][0]; |
|
173 | - $result['spam']['score'] = $received['score'][0]; |
|
174 | - $result['spam']['th'] = $received['th'][0]; |
|
172 | + $result['spam']['status']=$received['spamstatus'][0]; |
|
173 | + $result['spam']['score'] = $received['score'][0]; |
|
174 | + $result['spam']['th'] = $received['th'][0]; |
|
175 | 175 | if (count($received[0])>1) |
176 | 176 | $result['warn'][]= 'The Spamassassin Headers are present more than once. I consider only the last one.'; |
177 | 177 | } |
178 | 178 | if ( preg_match ('/\r\nX\-DSPAM\-Result:\s(?P<result>.*)\r\n/',$header,$received) != 1) |
179 | - $result['warn'] = 'DSPAM Result invalid, not present or present more than once.'; |
|
180 | - else |
|
181 | - $result['dspam']['type']=$received['result']; |
|
179 | + $result['warn'] = 'DSPAM Result invalid, not present or present more than once.'; |
|
180 | + else |
|
181 | + $result['dspam']['type']=$received['result']; |
|
182 | 182 | $prob = NULL; |
183 | 183 | $conf = NULL; |
184 | - if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1) |
|
185 | - $result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.'; |
|
184 | + if ( preg_match ('/\r\nX\-DSPAM\-Probability:\s(?P<prob>.*)\r\n/',$header,$received) != 1) |
|
185 | + $result['warn'][] = 'DSPAM Probability invalid, not present or present more than once.'; |
|
186 | 186 | else |
187 | 187 | $prob = $received['prob']; |
188 | 188 | if ( preg_match ('/\r\nX\-DSPAM\-Confidence:\s(?P<conf>.*)\r\n/',$header,$received) != 1) |
189 | - $result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.'; |
|
189 | + $result['warn'][] = 'DSPAM Confidence invalid, not present or present more than once.'; |
|
190 | 190 | else |
191 | 191 | $conf = $received['conf']; |
192 | 192 | $result['dspam']['level'] = dspamLevel($prob,$conf); |
193 | 193 | } |
194 | 194 | $received=NULL; |
195 | 195 | if ( preg_match ('/\r\nFrom:\s(?P<from>.*)\r\n/',$header,$received) != 1) |
196 | - $result['warn'][] = 'From header invalid or not present'; |
|
197 | - else |
|
198 | - $result['from'] = $received['from']; |
|
196 | + $result['warn'][] = 'From header invalid or not present'; |
|
197 | + else |
|
198 | + $result['from'] = $received['from']; |
|
199 | 199 | |
200 | - if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1) |
|
201 | - $result['warn'][] = 'Date header invalid or not present'; |
|
200 | + if ( preg_match ('/\r\nDate:\s(?P<date>.*)\r\n/',$header,$received) != 1) |
|
201 | + $result['warn'][] = 'Date header invalid or not present'; |
|
202 | 202 | else |
203 | 203 | $result['date'] = $received['date']; |
204 | 204 | |
205 | 205 | $received=NULL; |
206 | - if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1) |
|
207 | - $result['warn'][] = 'Message-ID invalid, not present or present more than once.'; |
|
206 | + if ( preg_match ('/\r\nMessage\-I(?:D|d):\s(?P<mid>.*)\r\n/',$header,$received) != 1) |
|
207 | + $result['warn'][] = 'Message-ID invalid, not present or present more than once.'; |
|
208 | 208 | else |
209 | 209 | $result['messageid']=$received['mid']; |
210 | 210 | |
211 | - $received=NULL; |
|
211 | + $received=NULL; |
|
212 | 212 | |
213 | - switch ($learn) { |
|
213 | + switch ($learn) { |
|
214 | 214 | case 'dspamc': |
215 | - if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1) |
|
215 | + if ( preg_match ('/\r\nX\-DSPAM\-Signature:\s(?P<sig>.*)\r\n/',$header,$received) != 1) |
|
216 | 216 | $result['warn'] = 'DSPAM Signature invalid, not present or present more than once.'; |
217 | 217 | else |
218 | 218 | $result['dspam']['learn']=$received['sig']; |
@@ -223,23 +223,23 @@ discard block |
||
223 | 223 | syslog (LOG_INFO,$user.': Error in "learn" imap configuration value. Please, set "dspamc" or "false".'); |
224 | 224 | } |
225 | 225 | |
226 | - return $result; |
|
226 | + return $result; |
|
227 | 227 | } |
228 | 228 | |
229 | 229 | |
230 | 230 | |
231 | 231 | |
232 | 232 | function printTableHeader($title,$content,$footer=FALSE,$fcontent) { |
233 | - print <<<END |
|
233 | + print <<<END |
|
234 | 234 | <caption>$title</caption> |
235 | 235 | <thead> |
236 | 236 | <tr> |
237 | 237 | END; |
238 | 238 | $kcontent = array_keys($content); |
239 | - $cols = count($kcontent); |
|
240 | - for ($i=0; $i<$cols; $i++) { |
|
239 | + $cols = count($kcontent); |
|
240 | + for ($i=0; $i<$cols; $i++) { |
|
241 | 241 | $key = $kcontent[$i]; |
242 | - printf ('<th colspan="%d" rowspan="%d">%s</th>', |
|
242 | + printf ('<th colspan="%d" rowspan="%d">%s</th>', |
|
243 | 243 | !is_array($content[$key]) ?: |
244 | 244 | count(array_keys($content[$key])) ?: '1', |
245 | 245 | !is_array($content[$key]) ?: |
@@ -255,13 +255,13 @@ discard block |
||
255 | 255 | } |
256 | 256 | } |
257 | 257 | |
258 | - print '</tr></thead>'; |
|
259 | - if ($footer) { |
|
260 | - print '<tfoot><tr>'; |
|
261 | - print "<th colspan=\"$cols\">".$fcontent.'</th>'; |
|
262 | - print '</tr></tfoot>'; |
|
263 | - } |
|
264 | - return TRUE; |
|
258 | + print '</tr></thead>'; |
|
259 | + if ($footer) { |
|
260 | + print '<tfoot><tr>'; |
|
261 | + print "<th colspan=\"$cols\">".$fcontent.'</th>'; |
|
262 | + print '</tr></tfoot>'; |
|
263 | + } |
|
264 | + return TRUE; |
|
265 | 265 | } |
266 | 266 | |
267 | 267 | |
@@ -336,7 +336,7 @@ discard block |
||
336 | 336 | } |
337 | 337 | /* Spamassassin format */ |
338 | 338 | if (isset($row['status'])) |
339 | - switch($row['status']) { |
|
339 | + switch($row['status']) { |
|
340 | 340 | case 'No': |
341 | 341 | $color = 'rgba(0,255,0, %.1f)'; |
342 | 342 | break; |