authfail.c (sarg-2.3.11) | : | authfail.c (sarg-2.4.0) | ||
---|---|---|---|---|
/* | /* | |||
* SARG Squid Analysis Report Generator http://sarg.sourceforge.net | * SARG Squid Analysis Report Generator http://sarg.sourceforge.net | |||
* 1998, 2013 | * 1998, 2015 | |||
* | * | |||
* SARG donations: | * SARG donations: | |||
* please look at http://sarg.sourceforge.net/donations.php | * please look at http://sarg.sourceforge.net/donations.php | |||
* Support: | * Support: | |||
* http://sourceforge.net/projects/sarg/forums/forum/363374 | * http://sourceforge.net/projects/sarg/forums/forum/363374 | |||
* --------------------------------------------------------------------- | * --------------------------------------------------------------------- | |||
* | * | |||
* This program is free software; you can redistribute it and/or modify | * This program is free software; you can redistribute it and/or modify | |||
* it under the terms of the GNU General Public License as published by | * it under the terms of the GNU General Public License as published by | |||
* the Free Software Foundation; either version 2 of the License, or | * the Free Software Foundation; either version 2 of the License, or | |||
skipping to change at line 29 | skipping to change at line 29 | |||
* GNU General Public License for more details. | * GNU General Public License for more details. | |||
* | * | |||
* You should have received a copy of the GNU General Public License | * You should have received a copy of the GNU General Public License | |||
* along with this program; if not, write to the Free Software | * along with this program; if not, write to the Free Software | |||
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111, USA. | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111, USA. | |||
* | * | |||
*/ | */ | |||
#include "include/conf.h" | #include "include/conf.h" | |||
#include "include/defs.h" | #include "include/defs.h" | |||
#include "include/readlog.h" | ||||
//! Name of the file containing the unsorted authentication failure entries. | ||||
static char authfail_unsort[MAXLEN]=""; | ||||
//! The file handle to write the entries. | ||||
static FILE *fp_authfail=NULL; | ||||
//! \c True if at least one anthentication failure entry exists. | ||||
static bool authfail_exists=false; | ||||
/*! | ||||
Open a file to store the authentication failure. | ||||
\return The file handle or NULL if no file is necessary. | ||||
*/ | ||||
void authfail_open(void) | ||||
{ | ||||
if ((ReportType & REPORT_TYPE_AUTH_FAILURES) == 0) { | ||||
if (debugz>=LogLevel_Process) debugaz(__FILE__,__LINE__,_("Authen | ||||
tication failures report not produced as it is not requested\n")); | ||||
return; | ||||
} | ||||
if (Privacy) { | ||||
if (debugz>=LogLevel_Process) debugaz(__FILE__,__LINE__,_("Authen | ||||
tication failures report not produced because privacy option is active\n")); | ||||
return; | ||||
} | ||||
format_path(__FILE__, __LINE__, authfail_unsort, sizeof(authfail_unsort), | ||||
"%s/authfail.int_unsort", tmp); | ||||
if ((fp_authfail=MY_FOPEN(authfail_unsort,"w"))==NULL) { | ||||
debuga(__FILE__,__LINE__,_("Cannot open file \"%s\": %s\n"),authf | ||||
ail_unsort,strerror(errno)); | ||||
exit(EXIT_FAILURE); | ||||
} | ||||
return; | ||||
} | ||||
/*! | ||||
Write one entry in the unsorted authentication file file provided that it is req | ||||
uired. | ||||
\param log_entry The entry to write into the log file. | ||||
*/ | ||||
void authfail_write(const struct ReadLogStruct *log_entry) | ||||
{ | ||||
char date[80]; | ||||
if (fp_authfail && (strstr(log_entry->HttpCode,"DENIED/401") != 0 || strs | ||||
tr(log_entry->HttpCode,"DENIED/407") != 0)) { | ||||
strftime(date,sizeof(date),"%d/%m/%Y\t%H:%M:%S",&log_entry->Entry | ||||
Time); | ||||
fprintf(fp_authfail, "%s\t%s\t%s\t%s\n",date,log_entry->User,log_ | ||||
entry->Ip,log_entry->Url); | ||||
authfail_exists=true; | ||||
} | ||||
} | ||||
/*! | ||||
Close the file opened by authfail_open(). | ||||
*/ | ||||
void authfail_close(void) | ||||
{ | ||||
if (fp_authfail) | ||||
{ | ||||
if (fclose(fp_authfail)==EOF) { | ||||
debuga(__FILE__,__LINE__,_("Write error in \"%s\": %s\n") | ||||
,authfail_unsort,strerror(errno)); | ||||
exit(EXIT_FAILURE); | ||||
} | ||||
fp_authfail=NULL; | ||||
} | ||||
} | ||||
/*! | ||||
Tell the caller if a authentication failure report exists. | ||||
\return \c True if the report is available or \c false if no report | ||||
was generated. | ||||
*/ | ||||
bool is_authfail(void) | ||||
{ | ||||
return(authfail_exists); | ||||
} | ||||
static void show_ignored_auth(FILE *fp_ou,int count) | static void show_ignored_auth(FILE *fp_ou,int count) | |||
{ | { | |||
char ignored[80]; | char ignored[80]; | |||
snprintf(ignored,sizeof(ignored),ngettext("%d more authentication failure not shown here…","%d more authentication failures not shown here… ",count),count); | snprintf(ignored,sizeof(ignored),ngettext("%d more authentication failure not shown here…","%d more authentication failures not shown here… ",count),count); | |||
fprintf(fp_ou,"<tr><td class=\"data\"></td><td class=\"data\"></td><td cl ass=\"data\"></td><td class=\"data2 more\">%s</td></tr>\n",ignored); | fprintf(fp_ou,"<tr><td class=\"data\"></td><td class=\"data\"></td><td cl ass=\"data\"></td><td class=\"data2 more\">%s</td></tr>\n",ignored); | |||
} | } | |||
void authfail_report(void) | void authfail_report(void) | |||
{ | { | |||
FILE *fp_in = NULL, *fp_ou = NULL; | FileObject *fp_in = NULL; | |||
FILE *fp_ou = NULL; | ||||
char *buf; | char *buf; | |||
char *url; | char *url; | |||
char authfail_in[MAXLEN]; | char authfail_sort[MAXLEN]; | |||
char report[MAXLEN]; | char report[MAXLEN]; | |||
char ip[MAXLEN]; | char ip[MAXLEN]; | |||
char oip[MAXLEN]; | char oip[MAXLEN]=""; | |||
char user[MAXLEN]; | char user[MAXLEN]; | |||
char ouser[MAXLEN]; | char ouser[MAXLEN]=""; | |||
char ouser2[MAXLEN]; | char ouser2[MAXLEN]=""; | |||
char data[15]; | char data[15]; | |||
char hora[15]; | char hora[15]; | |||
char tmp4[MAXLEN]; | ||||
char csort[MAXLEN]; | char csort[MAXLEN]; | |||
int z=0; | int z=0; | |||
int count=0; | int count=0; | |||
int cstatus; | int cstatus; | |||
int day,month,year; | int day,month,year; | |||
bool new_user; | bool new_user; | |||
struct getwordstruct gwarea; | struct getwordstruct gwarea; | |||
longline line; | longline line; | |||
struct userinfostruct *uinfo; | struct userinfostruct *uinfo; | |||
struct tm t; | struct tm t; | |||
if(DataFile[0] != '\0') return; | if (!authfail_exists) { | |||
if (!KeepTempLog && authfail_unsort[0]!='\0' && unlink(authfail_u | ||||
ouser[0]='\0'; | nsort)) | |||
ouser2[0]='\0'; | debuga(__FILE__,__LINE__,_("Failed to delete \"%s\": %s\n | |||
oip[0]='\0'; | "),authfail_unsort,strerror(errno)); | |||
snprintf(tmp4,sizeof(tmp4),"%s/authfail.int_unsort",tmp); | authfail_unsort[0]='\0'; | |||
if (debugz>=LogLevel_Process) debugaz(__FILE__,__LINE__,_("Authen | ||||
if(authfail_count == 0) { | tication failures report not produced because it is empty\n")); | |||
if (!KeepTempLog && unlink(tmp4)) { | ||||
debuga(_("Cannot delete \"%s\": %s\n"),tmp4,strerror(errn | ||||
o)); | ||||
} | ||||
if (debugz) debugaz(_("Authentication failures report not produce | ||||
d because it is empty\n")); | ||||
return; | return; | |||
} | } | |||
if (debugz>=LogLevel_Process) | ||||
debuga(__FILE__,__LINE__,_("Creating authentication failures repo | ||||
rt...\n")); | ||||
snprintf(authfail_in,sizeof(authfail_in),"%s/authfail.int_log",tmp); | format_path(__FILE__, __LINE__, authfail_sort, sizeof(authfail_sort), "%s | |||
snprintf(report,sizeof(report),"%s/authfail.html",outdirname); | /authfail.int_log", tmp); | |||
format_path(__FILE__, __LINE__, report, sizeof(report), "%s/authfail.html | ||||
", outdirname); | ||||
snprintf(csort,sizeof(csort),"sort -b -t \"\t\" -T \"%s\" -k 3,3 -k 5,5 - | if (snprintf(csort, sizeof(csort), "sort -b -t \"\t\" -T \"%s\" -k 3,3 -k | |||
o \"%s\" \"%s\"", tmp, authfail_in, tmp4); | 5,5 -o \"%s\" \"%s\"", tmp, authfail_sort, authfail_unsort) >= sizeof(csort)) { | |||
debuga(__FILE__,__LINE__,_("Sort command too long when sorting fi | ||||
le \"%s\" to \"%s\"\n"), authfail_unsort, authfail_sort); | ||||
debuga_more("sort -b -t \"\t\" -T \"%s\" -k 3,3 -k 5,5 -o \"%s\" | ||||
\"%s\"", tmp, authfail_sort, authfail_unsort); | ||||
exit(EXIT_FAILURE); | ||||
} | ||||
cstatus=system(csort); | cstatus=system(csort); | |||
if (!WIFEXITED(cstatus) || WEXITSTATUS(cstatus)) { | if (!WIFEXITED(cstatus) || WEXITSTATUS(cstatus)) { | |||
debuga(_("sort command return status %d\n"),WEXITSTATUS(cstatus)) | debuga(__FILE__,__LINE__,_("sort command return status %d\n"),WEX | |||
; | ITSTATUS(cstatus)); | |||
debuga(_("sort command: %s\n"),csort); | debuga(__FILE__,__LINE__,_("sort command: %s\n"),csort); | |||
exit(EXIT_FAILURE); | exit(EXIT_FAILURE); | |||
} | } | |||
if((fp_in=MY_FOPEN(authfail_in,"r"))==NULL) { | if ((fp_in=FileObject_Open(authfail_sort))==NULL) { | |||
debugapos("authfail",_("Cannot open file \"%s\": %s\n"),authfail_ | debuga(__FILE__,__LINE__,_("Cannot open file \"%s\": %s\n"),authf | |||
in,strerror(errno)); | ail_sort,FileObject_GetLastOpenError()); | |||
debuga(_("sort command: %s\n"),csort); | debuga(__FILE__,__LINE__,_("sort command: %s\n"),csort); | |||
exit(EXIT_FAILURE); | exit(EXIT_FAILURE); | |||
} | } | |||
if (!KeepTempLog && unlink(tmp4)) { | if (!KeepTempLog && unlink(authfail_unsort)) { | |||
debuga(_("Cannot delete \"%s\": %s\n"),tmp4,strerror(errno)); | debuga(__FILE__,__LINE__,_("Cannot delete \"%s\": %s\n"),authfail | |||
_unsort,strerror(errno)); | ||||
exit(EXIT_FAILURE); | exit(EXIT_FAILURE); | |||
} | } | |||
authfail_unsort[0]='\0'; | ||||
if((fp_ou=MY_FOPEN(report,"w"))==NULL) { | if ((fp_ou=MY_FOPEN(report,"w"))==NULL) { | |||
debugapos("authfail",_("Cannot open file \"%s\": %s\n"),report,st | debuga(__FILE__,__LINE__,_("Cannot open file \"%s\": %s\n"),repor | |||
rerror(errno)); | t,strerror(errno)); | |||
exit(EXIT_FAILURE); | exit(EXIT_FAILURE); | |||
} | } | |||
/* TRANSLATORS: This is a column header */ | ||||
write_html_header(fp_ou,(IndexTree == INDEX_TREE_DATE) ? 3 : 1,_("Authent ication Failures"),HTML_JS_NONE); | write_html_header(fp_ou,(IndexTree == INDEX_TREE_DATE) ? 3 : 1,_("Authent ication Failures"),HTML_JS_NONE); | |||
fputs("<tr><td class=\"header_c\">",fp_ou); | fputs("<tr><td class=\"header_c\">",fp_ou); | |||
fprintf(fp_ou,_("Period: %s"),period.html); | fprintf(fp_ou,_("Period: %s"),period.html); | |||
fputs("</td></tr>\n",fp_ou); | fputs("</td></tr>\n",fp_ou); | |||
fprintf(fp_ou,"<tr><th class=\"header_c\">%s</th></tr>\n",_("Authenticati on Failures")); | fprintf(fp_ou,"<tr><th class=\"header_c\">%s</th></tr>\n",_("Authenticati on Failures")); | |||
close_html_header(fp_ou); | close_html_header(fp_ou); | |||
fputs("<div class=\"report\"><table cellpadding=\"0\" cellspacing=\"2\">\ n",fp_ou); | fputs("<div class=\"report\"><table cellpadding=\"0\" cellspacing=\"2\">\ n",fp_ou); | |||
fprintf(fp_ou,"<tr><th class=\"header_l\">%s</th><th class=\"header_l\">% s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th></tr>\n",_("US ERID"),_("IP/NAME"),_("DATE/TIME"),_("ACCESSED SITE")); | fprintf(fp_ou,"<tr><th class=\"header_l\">%s</th><th class=\"header_l\">% s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th></tr>\n",_("US ERID"),_("IP/NAME"),_("DATE/TIME"),_("ACCESSED SITE")); | |||
if ((line=longline_create())==NULL) { | if ((line=longline_create())==NULL) { | |||
debuga(_("Not enough memory to read file \"%s\"\n"),authfail_in); | debuga(__FILE__,__LINE__,_("Not enough memory to read file \"%s\" \n"),authfail_sort); | |||
exit(EXIT_FAILURE); | exit(EXIT_FAILURE); | |||
} | } | |||
while((buf=longline_read(fp_in,line))!=NULL) { | while((buf=longline_read(fp_in,line))!=NULL) { | |||
getword_start(&gwarea,buf); | getword_start(&gwarea,buf); | |||
if (getword(data,sizeof(data),&gwarea,'\t')<0) { | if (getword(data,sizeof(data),&gwarea,'\t')<0) { | |||
debuga(_("Invalid date in file \"%s\"\n"),authfail_in); | debuga(__FILE__,__LINE__,_("Invalid date in file \"%s\"\n "),authfail_sort); | |||
exit(EXIT_FAILURE); | exit(EXIT_FAILURE); | |||
} | } | |||
if (getword(hora,sizeof(hora),&gwarea,'\t')<0) { | if (getword(hora,sizeof(hora),&gwarea,'\t')<0) { | |||
debuga(_("Invalid time in file \"%s\"\n"),authfail_in); | debuga(__FILE__,__LINE__,_("Invalid time in file \"%s\"\n "),authfail_sort); | |||
exit(EXIT_FAILURE); | exit(EXIT_FAILURE); | |||
} | } | |||
if (getword(user,sizeof(user),&gwarea,'\t')<0) { | if (getword(user,sizeof(user),&gwarea,'\t')<0) { | |||
debuga(_("Invalid user in file \"%s\"\n"),authfail_in); | debuga(__FILE__,__LINE__,_("Invalid user ID in file \"%s\ "\n"),authfail_sort); | |||
exit(EXIT_FAILURE); | exit(EXIT_FAILURE); | |||
} | } | |||
if (getword(ip,sizeof(ip),&gwarea,'\t')<0) { | if (getword(ip,sizeof(ip),&gwarea,'\t')<0) { | |||
debuga(_("Invalid IP address in file \"%s\"\n"),authfail_ in); | debuga(__FILE__,__LINE__,_("Invalid IP address in file \" %s\"\n"),authfail_sort); | |||
exit(EXIT_FAILURE); | exit(EXIT_FAILURE); | |||
} | } | |||
if (getword_ptr(buf,&url,&gwarea,'\t')<0) { | if (getword_ptr(buf,&url,&gwarea,'\t')<0) { | |||
debuga(_("Invalid url in file \"%s\"\n"),authfail_in); | debuga(__FILE__,__LINE__,_("Invalid url in file \"%s\"\n" ),authfail_sort); | |||
exit(EXIT_FAILURE); | exit(EXIT_FAILURE); | |||
} | } | |||
if (sscanf(data,"%d/%d/%d",&day,&month,&year)!=3) continue; | if (sscanf(data,"%d/%d/%d",&day,&month,&year)!=3) continue; | |||
computedate(year,month,day,&t); | computedate(year,month,day,&t); | |||
strftime(data,sizeof(data),"%x",&t); | strftime(data,sizeof(data),"%x",&t); | |||
uinfo=userinfo_find_from_id(user); | uinfo=userinfo_find_from_id(user); | |||
if (!uinfo) { | if (!uinfo) { | |||
debuga(_("Unknown user ID %s in file \"%s\"\n"),user,auth fail_in); | debuga(__FILE__,__LINE__,_("Unknown user ID %s in file \" %s\"\n"),user,authfail_sort); | |||
exit(EXIT_FAILURE); | exit(EXIT_FAILURE); | |||
} | } | |||
new_user=false; | new_user=false; | |||
if(z == 0) { | if (z == 0) { | |||
strcpy(ouser,user); | strcpy(ouser,user); | |||
strcpy(oip,ip); | strcpy(oip,ip); | |||
z++; | z++; | |||
new_user=true; | new_user=true; | |||
} else { | } else { | |||
if(strcmp(ouser,user) != 0) { | if (strcmp(ouser,user) != 0) { | |||
strcpy(ouser,user); | strcpy(ouser,user); | |||
new_user=true; | new_user=true; | |||
} | } | |||
if(strcmp(oip,ip) != 0) { | if (strcmp(oip,ip) != 0) { | |||
strcpy(oip,ip); | strcpy(oip,ip); | |||
new_user=true; | new_user=true; | |||
} | } | |||
} | } | |||
if(AuthfailReportLimit>0) { | if (AuthfailReportLimit>0) { | |||
if(strcmp(ouser2,uinfo->label) == 0) { | if (strcmp(ouser2,uinfo->label) == 0) { | |||
count++; | count++; | |||
} else { | } else { | |||
if(count>AuthfailReportLimit && AuthfailReportLim it>0) | if (count>AuthfailReportLimit && AuthfailReportLi mit>0) | |||
show_ignored_auth(fp_ou,count-AuthfailRep ortLimit); | show_ignored_auth(fp_ou,count-AuthfailRep ortLimit); | |||
count=1; | count=1; | |||
strcpy(ouser2,uinfo->label); | strcpy(ouser2,uinfo->label); | |||
} | } | |||
if(count > AuthfailReportLimit) | if (count > AuthfailReportLimit) | |||
continue; | continue; | |||
} | } | |||
fputs("<tr>",fp_ou); | fputs("<tr>",fp_ou); | |||
if (new_user) | if (new_user) | |||
fprintf(fp_ou,"<td class=\"data2\">%s</td><td class=\"dat a2\">%s</td>",uinfo->label,ip); | fprintf(fp_ou,"<td class=\"data2\">%s</td><td class=\"dat a2\">%s</td>",uinfo->label,ip); | |||
else | else | |||
fputs("<td class=\"data2\"></td><td class=\"data2\"></td> ",fp_ou); | fputs("<td class=\"data2\"></td><td class=\"data2\"></td> ",fp_ou); | |||
fprintf(fp_ou,"<td class=\"data2\">%s-%s</td><td class=\"data2\"> ",data,hora); | fprintf(fp_ou,"<td class=\"data2\">%s-%s</td><td class=\"data2\"> ",data,hora); | |||
if(BlockIt[0]!='\0' && url[0]!=ALIAS_PREFIX) { | if (BlockIt[0]!='\0' && url[0]!=ALIAS_PREFIX) { | |||
fprintf(fp_ou,"<a href=\"%s%s?url=",wwwDocumentRoot,Block It); | fprintf(fp_ou,"<a href=\"%s%s?url=",wwwDocumentRoot,Block It); | |||
output_html_url(fp_ou,url); | output_html_url(fp_ou,url); | |||
fputs("\"><img src=\"../images/sarg-squidguard-block.png\ "></a> ",fp_ou); | fputs("\"><img src=\"../images/sarg-squidguard-block.png\ "></a> ",fp_ou); | |||
} | } | |||
output_html_link(fp_ou,url,100); | output_html_link(fp_ou,url,100); | |||
fputs("</td></th>\n",fp_ou); | fputs("</td></th>\n",fp_ou); | |||
} | } | |||
fclose(fp_in); | if (FileObject_Close(fp_in)) { | |||
debuga(__FILE__,__LINE__,_("Read error in \"%s\": %s\n"),authfail | ||||
_sort,FileObject_GetLastCloseError()); | ||||
exit(EXIT_FAILURE); | ||||
} | ||||
longline_destroy(&line); | longline_destroy(&line); | |||
if(count>AuthfailReportLimit && AuthfailReportLimit>0) | if (count>AuthfailReportLimit && AuthfailReportLimit>0) | |||
show_ignored_auth(fp_ou,count-AuthfailReportLimit); | show_ignored_auth(fp_ou,count-AuthfailReportLimit); | |||
fputs("</table></div>\n",fp_ou); | fputs("</table></div>\n",fp_ou); | |||
if (write_html_trailer(fp_ou)<0) | write_html_trailer(fp_ou); | |||
debuga(_("Write error in file \"%s\"\n"),report); | if (fclose(fp_ou)==EOF) { | |||
if (fclose(fp_ou)==EOF) | debuga(__FILE__,__LINE__,_("Write error in \"%s\": %s\n"),report, | |||
debuga(_("Failed to close file \"%s\": %s\n"),report,strerror(err | strerror(errno)); | |||
no)); | exit(EXIT_FAILURE); | |||
} | ||||
if (!KeepTempLog && unlink(authfail_in)) { | if (!KeepTempLog && unlink(authfail_sort)) { | |||
debuga(_("Cannot delete \"%s\": %s\n"),authfail_in,strerror(errno | debuga(__FILE__,__LINE__,_("Cannot delete \"%s\": %s\n"),authfail | |||
)); | _sort,strerror(errno)); | |||
exit(EXIT_FAILURE); | exit(EXIT_FAILURE); | |||
} | } | |||
return; | return; | |||
} | } | |||
/*! | ||||
Remove any temporary file left by the authfail module. | ||||
*/ | ||||
void authfail_cleanup(void) | ||||
{ | ||||
if (fp_authfail) { | ||||
if (fclose(fp_authfail)==EOF) { | ||||
debuga(__FILE__,__LINE__,_("Write error in \"%s\": %s\n") | ||||
,authfail_unsort,strerror(errno)); | ||||
exit(EXIT_FAILURE); | ||||
} | ||||
fp_authfail=NULL; | ||||
} | ||||
if (authfail_unsort[0]) { | ||||
if (!KeepTempLog && unlink(authfail_unsort)==-1) | ||||
debuga(__FILE__,__LINE__,_("Failed to delete \"%s\": %s\n | ||||
"),authfail_unsort,strerror(errno)); | ||||
} | ||||
} | ||||
End of changes. 38 change blocks. | ||||
66 lines changed or deleted | 160 lines changed or added |