|
System | : | Linux MiraNet 3.0.0-14-generic-pae #23-Ubuntu SMP Mon Nov 21 22:07:10 UTC 2011 i686 |
Software | : | Apache. PHP/5.3.6-13ubuntu3.10 |
ID | : | uid=65534(nobody) gid=65534(nogroup) groups=65534(nogroup)
|
|
Safe Mode | : | OFF |
Open_Basedir | : | OFF |
Freespace | : | 30.55 GB of 70.42 GB (43.39%) |
|
MySQL: ON MSSQL: OFF Oracle: OFF PostgreSQL: OFF Curl: OFF Sockets: ON Fetch: OFF Wget: ON Perl: ON |
Disabled Functions: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
|
[ System Info ]
[ Processes ]
[ SQL Manager ]
[ Eval ]
[ Encoder ]
[ Mailer ]
[ Back Connection ]
[ Backdoor Server ]
[ Kernel Exploit Search ]
[ MD5 Decrypter ]
[ Reverse IP ]
[ Kill Shell ]
[ FTP Brute-Force ]
|
|
/
usr/
share/
fail2ban/
client/
- drwxr-xr-x
|
Viewing file: beautifier.py (5.14 KB) -rw-r--r--Select action/file-type:  ( +) |  ( +) |  ( +) | Code ( +) | Session ( +) |  ( +) | SDB ( +) |  ( +) |  ( +) |  ( +) |  ( +) |  ( +) |
# This file is part of Fail2Ban. # # Fail2Ban is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # Fail2Ban is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with Fail2Ban; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
# Author: Cyril Jaquier # # $Revision: 644 $
__author__ = "Cyril Jaquier" __version__ = "$Revision: 644 $" __date__ = "$Date: 2008-01-15 00:12:21 +0100 (Tue, 15 Jan 2008) $" __copyright__ = "Copyright (c) 2004 Cyril Jaquier" __license__ = "GPL"
from server.jails import UnknownJailException from server.jails import DuplicateJailException import logging
# Gets the instance of the logger. logSys = logging.getLogger("fail2ban.client.config")
## # Beautify the output of the client. # # Fail2ban server only return unformatted return codes which need to be # converted into user readable messages.
class Beautifier: def __init__(self, cmd = None): self.__inputCmd = cmd
def setInputCmd(self, cmd): self.__inputCmd = cmd def getInputCmd(self): return self.__inputCmd def beautify(self, response): logSys.debug("Beautify " + `response` + " with " + `self.__inputCmd`) inC = self.__inputCmd msg = response try: if inC[0] == "ping": msg = "Server replied: " + response elif inC[0] == "start": msg = "Jail started" elif inC[0] == "stop": if len(inC) == 1: if response == None: msg = "Shutdown successful" else: if response == None: msg = "Jail stopped" elif inC[0] == "add": msg = "Added jail " + response elif inC[0:1] == ['status']: if len(inC) > 1: # Create IP list ipList = "" for ip in response[1][1][2][1]: ipList += ip + " " # Creates file list. fileList = "" for f in response[0][1][2][1]: fileList += f + " " # Display information msg = "Status for the jail: " + inC[1] + "\n" msg = msg + "|- " + response[0][0] + "\n" msg = msg + "| |- " + response[0][1][2][0] + ":\t" + fileList + "\n" msg = msg + "| |- " + response[0][1][0][0] + ":\t" + `response[0][1][0][1]` + "\n" msg = msg + "| `- " + response[0][1][1][0] + ":\t" + `response[0][1][1][1]` + "\n" msg = msg + "`- " + response[1][0] + "\n" msg = msg + " |- " + response[1][1][0][0] + ":\t" + `response[1][1][0][1]` + "\n" msg = msg + " | `- " + response[1][1][2][0] + ":\t" + ipList + "\n" msg = msg + " `- " + response[1][1][1][0] + ":\t" + `response[1][1][1][1]` else: msg = "Status\n" msg = msg + "|- " + response[0][0] + ":\t" + `response[0][1]` + "\n" msg = msg + "`- " + response[1][0] + ":\t\t" + response[1][1] elif inC[1] == "logtarget": msg = "Current logging target is:\n" msg = msg + "`- " + response elif inC[1:2] == ['loglevel']: msg = "Current logging level is " if response == 1: msg = msg + "ERROR" elif response == 2: msg = msg + "WARN" elif response == 3: msg = msg + "INFO" elif response == 4: msg = msg + "DEBUG" else: msg = msg + `response` elif inC[2] in ("logpath", "addlogpath", "dellogpath"): if len(response) == 0: msg = "No file is currently monitored" else: msg = "Current monitored log file(s):\n" for path in response[:-1]: msg = msg + "|- " + path + "\n" msg = msg + "`- " + response[len(response)-1] elif inC[2] in ("ignoreip", "addignoreip", "delignoreip"): if len(response) == 0: msg = "No IP address/network is ignored" else: msg = "These IP addresses/networks are ignored:\n" for ip in response[:-1]: msg = msg + "|- " + ip + "\n" msg = msg + "`- " + response[len(response)-1] elif inC[2] in ("failregex", "addfailregex", "delfailregex", "ignoreregex", "addignoreregex", "delignoreregex"): if len(response) == 0: msg = "No regular expression is defined" else: msg = "The following regular expression are defined:\n" c = 0 for ip in response[:-1]: msg = msg + "|- [" + str(c) + "]: " + ip + "\n" c += 1 msg = msg + "`- [" + str(c) + "]: " + response[len(response)-1] except Exception: logSys.warn("Beautifier error. Please report the error") logSys.error("Beautify " + `response` + " with " + `self.__inputCmd` + " failed") msg = msg + `response` return msg
def beautifyError(self, response): logSys.debug("Beautify (error) " + `response` + " with " + `self.__inputCmd`) msg = response if isinstance(response, UnknownJailException): msg = "Sorry but the jail '" + response[0] + "' does not exist" elif isinstance(response, IndexError): msg = "Sorry but the command is invalid" elif isinstance(response, DuplicateJailException): msg = "The jail '" + response[0] + "' already exists" return msg
|