ShellBanner
System:Linux MiraNet 3.0.0-14-generic-pae #23-Ubuntu SMP Mon Nov 21 22:07:10 UTC 2011 i686
Software:Apache. PHP/5.3.6-13ubuntu3.10
ID:uid=65534(nobody) gid=65534(nogroup) groups=65534(nogroup)
Safe Mode:OFF
Open_Basedir:OFF
Freespace:30.56 GB of 70.42 GB (43.41%)
MySQL: ON MSSQL: OFF Oracle: OFF PostgreSQL: OFF Curl: OFF Sockets: ON Fetch: OFF Wget: ON Perl: ON
Disabled Functions: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,

/ usr/ share/ fail2ban/ client/ - drwxr-xr-x

Directory:
Viewing file:     jailreader.py (5.06 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
# This file is part of Fail2Ban.
#
# Fail2Ban is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# Fail2Ban is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Fail2Ban; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA

# Author: Cyril Jaquier

# $Revision: 690 $

__author__ = "Cyril Jaquier"
__version__ = "$Revision: 690 $"
__date__ = "$Date: 2008-05-12 10:34:42 +0200 (Mon, 12 May 2008) $"
__copyright__ = "Copyright (c) 2004 Cyril Jaquier"
__license__ = "GPL"

import logging, re, glob

from configreader import ConfigReader
from filterreader import FilterReader
from actionreader import ActionReader

# Gets the instance of the logger.
logSys = logging.getLogger("fail2ban.client.config")

class JailReader(ConfigReader):
    
    actionCRE = re.compile("^((?:\w|-|_|\.)+)(?:\[(.*)\])?$")
    
    def __init__(self, name):
        ConfigReader.__init__(self)
        self.__name = name
        self.__filter = None
        self.__actions = list()
    
    def setName(self, value):
        self.__name = value
    
    def getName(self):
        return self.__name
    
    def read(self):
        ConfigReader.read(self, "jail")
    
    def isEnabled(self):
        return self.__opts["enabled"]
    
    def getOptions(self):
        opts = [["bool", "enabled", "false"],
                ["string", "logpath", "/var/log/messages"],
                ["string", "backend", "auto"],
                ["int", "maxretry", 3],
                ["int", "findtime", 600],
                ["int", "bantime", 600],
                ["string", "failregex", None],
                ["string", "ignoreregex", None],
                ["string", "ignoreip", None],
                ["string", "filter", ""],
                ["string", "action", ""]]
        self.__opts = ConfigReader.getOptions(self, self.__name, opts)
        
        if self.isEnabled():
            # Read filter
            self.__filter = FilterReader(self.__opts["filter"], self.__name)
            ret = self.__filter.read()
            if ret:
                self.__filter.getOptions(self.__opts)
            else:
                logSys.error("Unable to read the filter")
                return False
            
            # Read action
            for act in self.__opts["action"].split('\n'):
                try:
                    splitAct = JailReader.splitAction(act)
                    action = ActionReader(splitAct, self.__name)
                    ret = action.read()
                    if ret:
                        action.getOptions(self.__opts)
                        self.__actions.append(action)
                    else:
                        raise AttributeError("Unable to read action")
                except Exception, e:
                    logSys.error("Error in action definition " + act)
                    logSys.debug(e)
                    return False
        return True
    
    def convert(self):
        stream = []
        for opt in self.__opts:
            if opt == "logpath":
                for path in self.__opts[opt].split("\n"):
                    pathList = glob.glob(path)
                    if len(pathList) == 0:
                        logSys.error("No file found for " + path)
                    for p in pathList:
                        stream.append(["set", self.__name, "addlogpath", p])
            elif opt == "backend":
                backend = self.__opts[opt]
            elif opt == "maxretry":
                stream.append(["set", self.__name, "maxretry", self.__opts[opt]])
            elif opt == "ignoreip":
                for ip in self.__opts[opt].split():
                    # Do not send a command if the rule is empty.
                    if ip != '':
                        stream.append(["set", self.__name, "addignoreip", ip])
            elif opt == "findtime":
                stream.append(["set", self.__name, "findtime", self.__opts[opt]])
            elif opt == "bantime":
                stream.append(["set", self.__name, "bantime", self.__opts[opt]])
            elif opt == "failregex":
                stream.append(["set", self.__name, "addfailregex", self.__opts[opt]])
            elif opt == "ignoreregex":
                for regex in self.__opts[opt].split('\n'):
                    # Do not send a command if the rule is empty.
                    if regex != '':
                        stream.append(["set", self.__name, "addignoreregex", regex])
        stream.extend(self.__filter.convert())
        for action in self.__actions:
            stream.extend(action.convert())
        stream.insert(0, ["add", self.__name, backend])
        return stream
    
    #@staticmethod
    def splitAction(action):
        m = JailReader.actionCRE.match(action)
        d = dict()
        if not m.group(2) == None:
            # Huge bad hack :( This method really sucks. TODO Reimplement it.
            actions = ""
            escapeChar = None
            allowComma = False
            for c in m.group(2):
                if c in ('"', "'") and not allowComma:
                    # Start
                    escapeChar = c
                    allowComma = True
                elif c == escapeChar:
                    # End
                    escapeChar = None
                    allowComma = False
                else:
                    if c == ',' and allowComma:
                        actions += "<COMMA>"
                    else:
                        actions += c
            
            # Split using ,
            actionsSplit = actions.split(',')
            # Replace the tag <COMMA> with ,
            actionsSplit = [n.replace("<COMMA>", ',') for n in actionsSplit]
            
            for param in actionsSplit:
                p = param.split('=')
                try:
                    d[p[0].strip()] = p[1].strip()
                except IndexError:
                    logSys.error("Invalid argument %s in '%s'" % (p, m.group(2)))
        return [m.group(1), d]
    splitAction = staticmethod(splitAction)
Command:
Quick Commands:
Upload:
[Read-Only] Max size: 100MB
PHP Filesystem: <@ Ú
Search File:
regexp
Create File:
Overwrite [Read-Only]
View File:
Mass Defacement:
[+] Main Directory: [+] Defacement Url:
LmfaoX Shell - Private Build [BETA] - v0.1 -; Generated: 0.4585 seconds