obrisane nepotrebne datoteke od zadnjeg builda
[ossec-hids.git] / debian / ossec-hids / var / ossec / active-response / bin / host-deny.sh
diff --git a/debian/ossec-hids/var/ossec/active-response/bin/host-deny.sh b/debian/ossec-hids/var/ossec/active-response/bin/host-deny.sh
deleted file mode 100755 (executable)
index 0893125..0000000
+++ /dev/null
@@ -1,147 +0,0 @@
-#!/bin/sh
-# Adds an IP to the /etc/hosts.deny file
-# Requirements: sshd and other binaries with tcp wrappers support
-# Expect: srcip
-# Author: Daniel B. Cid
-# Last modified: Nov 09, 2005
-
-ACTION=$1
-USER=$2
-IP=$3
-
-LOCAL=`dirname $0`;
-cd $LOCAL
-cd ../
-PWD=`pwd`
-LOCK="${PWD}/host-deny-lock"
-LOCK_PID="${PWD}/host-deny-lock/pid"
-UNAME=`uname`
-
-
-# This number should be more than enough (even if a hundred
-# instances of this script is ran together). If you have
-# a really loaded env, you can increase it to 75 or 100.
-MAX_ITERATION="50"
-
-
-# Lock function
-lock()
-{
-    i=0;
-    # Providing a lock.
-    while [ 1 ]; do
-        mkdir ${LOCK} > /dev/null 2>&1
-        MSL=$?
-        if [ "${MSL}" = "0" ]; then
-            # Lock acquired (setting the pid)
-            echo "$$" > ${LOCK_PID}
-            return;
-        fi
-
-        # Getting currently/saved PID locking the file
-        C_PID=`cat ${LOCK_PID} 2>/dev/null`
-        if [ "x" = "x${S_PID}" ]; then
-            S_PID=${C_PID}
-        fi
-
-        # Breaking out of the loop after X attempts
-        if [ "x${C_PID}" = "x${S_PID}" ]; then
-            i=`expr $i + 1`;
-        fi
-
-        sleep $i;
-
-        i=`expr $i + 1`;
-
-        # So i increments 2 by 2 if the pid does not change.
-        # If the pid keeps changing, we will increments one
-        # by one and fail after MAX_ITERACTION
-        if [ "$i" = "${MAX_ITERATION}" ]; then
-            echo "`date` Unable to execute. Locked: $0" \
-                        >> ${PWD}/ossec-hids-responses.log
-
-            # Unlocking and exiting
-            unlock;
-            exit 1;
-        fi
-    done
-}
-
-# Unlock function
-unlock()
-{
-    rm -rf ${LOCK}
-}
-
-
-# Logging the call
-echo "`date` $0 $1 $2 $3 $4 $5" >> ${PWD}/../logs/active-responses.log
-
-
-# IP Address must be provided
-if [ "x${IP}" = "x" ]; then
-    echo "$0: Missing argument <action> <user> (ip)"
-    exit 1;
-fi
-
-
-# Checking for invalid entries (lacking "." or ":", etc)
-echo "${IP}" | egrep "\.|\:" > /dev/null 2>&1
-if [ ! $? = 0 ]; then
-    echo "`date` Invalid ip/hostname entry: ${IP}" >> ${PWD}/../logs/active-responses.log
-    exit 1;
-fi
-
-
-# Adding the ip to hosts.deny
-if [ "x${ACTION}" = "xadd" ]; then
-    # Looking for duplication
-    IPKEY=$(grep -w "${IP}" /etc/hosts.deny)
-    if [ ! -z "$IPKEY" ]; then
-        echo "IP ${IP} already exists on host.deny..." >> ${PWD}/../logs/active-responses.log
-        exit 1
-    fi
-    lock;
-    echo "${IP}" | grep "\:" > /dev/null 2>&1
-    if [ $? = 0 ]; then
-        IP="[${IP}]"
-    fi
-    if [ "X$UNAME" = "XFreeBSD" ]; then
-        echo "ALL : ${IP} : deny" >> /etc/hosts.allow
-    else
-        echo "ALL:${IP}" >> /etc/hosts.deny
-    fi
-    unlock;
-    exit 0;
-
-
-# Deleting from hosts.deny
-elif [ "x${ACTION}" = "xdelete" ]; then
-    lock;
-    TMP_FILE=`mktemp ${PWD}/ossec-hosts.XXXXXXXXXX`
-    if [ "X${TMP_FILE}" = "X" ]; then
-        # Cheap fake tmpfile, but should be harder then no random data
-        TMP_FILE="${PWD}/ossec-hosts.`cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 32 | head -1 `"
-    fi
-    echo "${IP}" | grep "\:" > /dev/null 2>&1
-    if [ $? = 0 ]; then
-        IP="\[${IP}\]"
-    fi
-    if [ "X$UNAME" = "XFreeBSD" ]; then
-        cat /etc/hosts.allow | grep -v "ALL : ${IP} : deny$"> ${TMP_FILE}
-        mv ${TMP_FILE} /etc/hosts.allow
-    else
-        cat /etc/hosts.deny | grep -v "ALL:${IP}$"> ${TMP_FILE}
-        cat ${TMP_FILE} > /etc/hosts.deny
-        rm ${TMP_FILE}
-    fi
-    unlock;
-    exit 0;
-
-
-# Invalid action
-else
-    echo "$0: invalid action: ${ACTION}"
-fi
-
-exit 1;