mirror of
https://github.com/fusionpbx/fusionpbx.git
synced 2026-02-03 14:39:20 +00:00
129 lines
3.4 KiB
PHP
129 lines
3.4 KiB
PHP
<?php
|
|
|
|
/**
|
|
* event_guard_nftables class
|
|
*
|
|
*/
|
|
class event_guard_nftables implements event_guard_interface {
|
|
|
|
/**
|
|
* database object
|
|
* @var database
|
|
*/
|
|
private $database;
|
|
|
|
/**
|
|
* settings object
|
|
* @var settings
|
|
*/
|
|
private $settings;
|
|
|
|
/**
|
|
* firewall_path string
|
|
* @var string
|
|
*/
|
|
private $firewall_path;
|
|
|
|
/**
|
|
* called when the object is created
|
|
*/
|
|
public function __construct(settings $settings) {
|
|
// Save the settings object
|
|
$this->settings = $settings;
|
|
|
|
// Set the database object from the settings object
|
|
$this->database = $settings->database();
|
|
|
|
// Set firewall path
|
|
$this->firewall_path = trim(shell_exec('command -v nft'));
|
|
|
|
// Create a chain array
|
|
$chains[] = 'sip-auth-ip';
|
|
$chains[] = 'sip-auth-fail';
|
|
foreach ($chains as $chain) {
|
|
shell_exec($this->firewall_path.' add chain inet filter ' . $chain . ' { type filter hook input priority -50 \; }'); // >/dev/null 2>&1 &');
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Execute a block command for iptables
|
|
*
|
|
* @param string $ip_address The IP address to block
|
|
* @param string $filter The filter name for nftables, iptables or pf
|
|
* @param array $event The event data containing 'to-user' and 'to-host'
|
|
*
|
|
* @return boolean True if the block command was executed successfully, false otherwise
|
|
*/
|
|
public function block_add(string $ip_address, string $filter) : bool {
|
|
// Invalid IP address
|
|
if (!filter_var($ip_address, FILTER_VALIDATE_IP)) {
|
|
return false;
|
|
}
|
|
|
|
// Run the block command for nftables
|
|
// Example: nft add element inet filter sip-auth-ip { 192.168.1.100 }
|
|
$command = $this->firewall_path.' add rule inet filter '.$filter.' ip saddr '.$ip_address.' counter drop';
|
|
$result = shell_exec($command);
|
|
if (!empty($result) && strlen($result) > 3) {
|
|
return false;
|
|
}
|
|
|
|
// Return success
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Unblock a specified IP address from a firewall.
|
|
*
|
|
* @param string $ip_address The IP address to unblock.
|
|
* @param string $filter The filter name used in the firewall configuration.
|
|
*
|
|
* @return bool True if the IP address was successfully unblocked, false otherwise.
|
|
*/
|
|
public function block_delete(string $ip_address, string $filter) : bool {
|
|
// Invalid IP address
|
|
if (!filter_var($ip_address, FILTER_VALIDATE_IP)) {
|
|
return false;
|
|
}
|
|
|
|
// Command used to get the handle
|
|
$command = $this->firewall_path.' -a list chain inet filter '.$filter.' | grep '.$ip_address;
|
|
echo $command."\n";
|
|
$result = trim(shell_exec($command));
|
|
$rows = explode("\n", $result);
|
|
|
|
// Unblock the address
|
|
foreach ($rows as $row) {
|
|
$handle = trim(explode("#", $row)[1] ?? '');
|
|
$command = $this->firewall_path.' delete rule inet filter '.$filter.' '.$handle;
|
|
echo $command."\n";
|
|
$result = shell_exec($command);
|
|
}
|
|
if (!empty($result)) {
|
|
return false;
|
|
}
|
|
|
|
// Return success
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Check if an IP address is blocked in the configured firewall.
|
|
*
|
|
* @param string $ip_address The IP address to check
|
|
*
|
|
* @return bool True if the address is blocked, False otherwise
|
|
*/
|
|
public function block_exists(string $ip_address, string $filter) : bool {
|
|
// Determine whether to return true or false
|
|
// Check to see if the address is blocked
|
|
$command = $this->firewall_path.' list chain inet filter input | grep "ip saddr '.$ip_address.'"';
|
|
$result = shell_exec($command);
|
|
if (!empty($result) && strlen($result) > 3) {
|
|
return true;
|
|
}
|
|
|
|
// Return failed
|
|
return false;
|
|
}
|
|
} |