/web/acc/admin/bl_categories_help.php |
---|
6,8 → 6,8 |
$bl_dir="/etc/e2guardian/lists/blacklists/"; |
$bl_iptables_dir="/usr/local/share/iptables-bl/"; |
$wl_iptables_dir="/usr/local/share/iptables-wl/"; |
$bl_dnsmasq_dir="/usr/local/share/dnsmasq-bl/"; |
$wl_dnsmasq_dir="/usr/local/share/dnsmasq-wl/"; |
$bl_unbound_dir="/usr/local/share/unbound-bl/"; |
$wl_unbound_dir="/usr/local/share/unbound-wl/"; |
# Choice of language |
$Language = 'en'; |
if(isset($_SERVER['HTTP_ACCEPT_LANGUAGE'])) |
42,12 → 42,11 |
$l_example="Example(s) : "; |
$l_error_cat = "Error category"; |
$l_error_list = "Error listing"; |
} |
if(isset($_GET['cat'])) |
{ |
$categorie = $_GET['cat']; |
} |
} |
else |
{ |
$categorie = $l_error_cat; |
61,48 → 60,73 |
$liste = $l_error_list; |
} |
if($liste == "bl") |
{ |
$bl_categorie_domain_file = $bl_dnsmasq_dir.$categorie.".conf"; |
{ |
$bl_categorie_domain_file = $bl_unbound_dir.$categorie.".conf"; |
$bl_categorie_url_file = $bl_dir.$categorie."/urls"; |
$bl_categorie_ip_file = $bl_iptables_dir.$categorie; |
//don't calc again on reload (click on the number of domain/urls/ip) |
if (isset ($_GET['nb_domains']) && isset($_GET['nb_urls']) && isset($_GET['nb_ip'])) |
{ |
{ |
$nb_domains = $_GET['nb_domains']; |
$nb_urls = $_GET['nb_urls']; |
$nb_ip = $_GET['nb_ip']; |
} |
} |
else |
{ |
if (file_exists($bl_categorie_domain_file)) |
{ |
if (file_exists($bl_categorie_domain_file)) |
$nb_domains = exec("wc -l $bl_categorie_domain_file | cut -d ' ' -f1"); |
# two lines per domain |
$nb_domains = exec("wc -l $bl_categorie_domain_file | cut -d ' ' -f1") / 2; |
} |
else |
{ |
$nb_domains = $l_error_open_file." ".$bl_categorie_domain_file; |
} |
if (file_exists($bl_categorie_url_file)) |
{ |
$nb_urls = exec ("wc -l $bl_categorie_url_file | cut -d ' ' -f1"); |
} |
else |
{ |
$nb_urls = $l_error_open_file." ".$bl_categorie_url_file; |
} |
if(file_exists($bl_categorie_ip_file)) |
{ |
$nb_ip = exec("wc -l $bl_categorie_ip_file | cut -d ' ' -f1"); |
} |
else |
{ |
$nb_ip = $l_error_open_file." ".$bl_categorie_ip_file; |
} |
} |
} |
else |
{ |
$wl_categorie_domain_file = $wl_dnsmasq_dir.$categorie.".conf"; |
{ |
$wl_categorie_domain_file = $wl_unbound_dir.$categorie.".conf"; |
$wl_categorie_ip_file = $wl_iptables_dir.$categorie; |
if (file_exists($wl_categorie_domain_file)) |
{ |
$nb_domains = exec("wc -l $wl_categorie_domain_file | cut -d ' ' -f1"); |
} |
else |
{ |
$nb_domains = $l_error_open_file." ".$wl_categorie_domain_file; |
} |
if (file_exists($wl_categorie_ip_file)) |
{ |
$nb_ip = exec("wc -l $wl_categorie_ip_file | cut -d ' ' -f1"); |
} |
else |
{ |
$nb_ip = 0; |
//$nb_ip = $l_error_open_file." ".$wl_categorie_ip_file; |
} |
$nb_urls = 0; //no urls in WL |
} |
} |
$global_usage = file($bl_dir."global_usage"); |
$langue = strtoupper($Language); |
if(isset($categorie)) |
111,9 → 135,13 |
foreach($global_usage as $line) |
{ |
if(preg_match("#^NAME:.$categorie$#", $line) == 1) |
{ |
$fin1 = 1; |
} |
if($fin1 && preg_match("#^DESC.$langue:.#", $line) == 1) |
{ |
$l_description_cat = preg_replace("#^DESC.$langue:.#", "", $line); |
} |
if($fin1 && preg_match("#^NAME.$langue:.#", $line) == 1) |
{ |
$l_name_cat = preg_replace("#^NAME.$langue:.#", "", $line); |
178,7 → 206,7 |
{ |
$filtre = $liste == "bl" ? $bl_categorie_domain_file : $wl_categorie_domain_file; |
exec("head -n 15 ".escapeshellarg($filtre)." | cut -d '/' -f2", $resultat); |
exec("head -n 15 ".escapeshellarg($filtre)." | grep 'transparent' | awk '{ print $2 }'", $resultat); |
} |
elseif($titre == "ip") |
{ |
190,7 → 218,9 |
exec("head -n 15 ".escapeshellarg($filtre), $resultat); |
} |
for($i=0; $i<count($resultat); $i++) |
{ |
echo $resultat[$i]."<br/>"; |
} |
?> |
</td></tr> |
</TABLE> |
197,4 → 227,3 |
<center><a href="javascript:window.close();"><b><?php echo "$l_close"; ?></b></a></center> |
</BODY> |
</HTML> |
/web/acc/admin/bl_filter.php |
---|
37,22 → 37,22 |
} |
} |
function echo_file ($filename) |
{ |
if (file_exists($filename)) |
{ |
if (file_exists($filename)) |
if (filesize($filename) != 0) |
{ |
if (filesize($filename) != 0) |
{ |
$pointeur=fopen($filename,"r"); |
$tampon = fread($pointeur, filesize($filename)); |
fclose($pointeur); |
echo $tampon; |
} |
} |
} |
else |
{ |
{ |
echo "$filename doesn't exist"; |
} |
} |
} |
function echo_ip_file ($filename) |
{ |
$filename = escapeshellarg($filename); |
68,7 → 68,7 |
if(isset($_SERVER['HTTP_ACCEPT_LANGUAGE'])){ |
$Langue = explode(",",$_SERVER['HTTP_ACCEPT_LANGUAGE']); |
$Language = strtolower(substr(chop($Langue[0]),0,2)); |
} |
} |
if($Language == 'fr'){ |
$l_bl="Liste noire générale"; |
$l_load="Chargement..."; |
89,7 → 89,7 |
$l_rehabilitated_ip_explain="Entrez ici des IP bloquées par la liste noire <BR> que vous souhaitez réhabiliter."; |
$l_one_dns="Entrez une adresse DNS par ligne (exemple : www.domaine.com)"; |
$l_one_ip="Entrez une IP par ligne (exemple : 123.123.123.123)"; |
$l_one_dns_ip="Entrez un nom de domaine ou une adresse IP ou une adresse de réseau par ligne<br>exemple (domaine) : .domaine.org - exemple (ip) : 61.54.52.56 - exemple (réseau) : 172.16.0.0/16"; |
$l_one_dns_ip="Entrez un nom de domaine ou une adresse IP ou une adresse de réseau par ligne<br>exemple (domaine) : domaine.org. - exemple (ip) : 61.54.52.56 - exemple (réseau) : 172.16.0.0/16"; |
$l_record="Enregistrer les modifications"; |
$l_wait="Une fois validées, 10 secondes sont nécessaires pour traiter vos modifications"; |
$l_ip_filtering="Filtrer les URLs contenant une adresse IP au lieu d'un nom de domaine (ex: http://25.56.58.59/index.htm)"; |
133,9 → 133,9 |
$l_add_to_bl="Domain names or IP addresses to add to the blacklist"; |
$l_rehabilitated_ip="IP addresses to rehabilitated"; |
$l_rehabilitated_ip_explain="Enter here IP that are blocked by the blacklist <BR> and you want to rehabilitate."; |
$l_one_dns="Enter one DNS per row (example : www.domaine.com)"; |
$l_one_dns="Enter one DNS per row (example : www.domain.com)"; |
$l_one_ip="Enter one IP per row (example : 123.123.123.123)"; |
$l_one_dns_ip="Enter one domain name or one IP address or one network address per row <br>example (domain): .domain.org - example (ip): 61.54.56.52 - example (network) : 172.16.0.0/16"; |
$l_one_dns_ip="Enter one domain name or one IP address or one network address per row <br>example (domain): domain.org. - example (ip): 61.54.56.52 - example (network) : 172.16.0.0/16"; |
$l_record="Save changes"; |
$l_wait="Once validated, 10 seconds are necessary to compute your modifications"; |
$l_ip_filtering="Filtering URLs that contain an IP address instead of a domain name (ie: http://25.56.58.59/index.htm)"; |
165,142 → 165,158 |
$dir_blacklist=$dir_dg."blacklists/"; |
$dir_bl_ip="/usr/local/share/iptables-bl/"; |
$dir_bl_ip_enabled="/usr/local/share/iptables-bl-enabled/"; |
$dir_bl_domain_names="/usr/local/share/dnsmasq-bl/"; |
$dir_bl_domain_names_enabled="/usr/local/share/dnsmasq-bl-enabled/"; |
$dir_bl_domain_names="/usr/local/share/unbound-bl/"; |
$dir_bl_domain_names_enabled="/usr/local/share/unbound-bl-enabled/"; |
$bl_categories=$dir_etc."alcasar-bl-categories"; |
$bl_categories_enabled=$dir_etc."alcasar-bl-categories-enabled"; |
$conf_file=$dir_etc."alcasar.conf"; |
$urlregex_file=$dir_dg."urlregexplist"; |
$domainfilter_file="/etc/unbound/conf.d/blacklist/domainfilter.conf"; |
$bannedsite_file=$dir_dg."bannedsitelist"; |
$dir_tmp="/tmp/blacklists"; |
$update_file_cat="/usr/local/etc/update_cat.conf"; |
$bl_safesearch="off"; |
$bl_pureip="off"; |
# default values |
if (is_file ($conf_file)) |
{ |
{ |
$tab=file($conf_file); |
if ($tab) |
{ |
foreach ($tab as $line) |
{ |
foreach ($tab as $line) |
{ |
$field=explode("=", $line); |
if ($field[0] == "PRIVATE_IP") |
{ |
$PRIVATE_IP_MASK=trim($field[1]); |
$tmp = explode("/",$PRIVATE_IP_MASK); |
$PRIVATE_IP=$tmp[0]; |
} |
switch ($field[0]) { |
case 'PRIVATE_IP': |
$PRIVATE_IP_MASK=trim($field[1]); |
$tmp = explode("/",$PRIVATE_IP_MASK); |
$PRIVATE_IP=$tmp[0]; |
break; |
case 'BL_SAFESEARCH': |
if (strtolower(trim($field[1])) == 'on') { |
$bl_safesearch='on'; |
} |
break; |
case 'BL_PUREIP': |
if (strtolower(trim($field[1])) == 'on') { |
$bl_pureip='on'; |
} |
break; |
} |
} |
} |
} |
else { echo "$l_error_open_file $conf_file";} |
if (isset($_POST['choix'])){ $choix=$_POST['choix']; } else { $choix=""; } |
switch ($choix) |
{ |
case 'Download_list' : |
exec ("sudo /usr/local/bin/alcasar-bl.sh --download"); |
break; |
case 'Active_list' : |
exec ("sudo /usr/local/bin/alcasar-bl.sh --adapt"); |
exec ("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
break; |
case 'Reject_list' : |
unlink ("$dir_tmp/blacklists.tar.gz"); unlink ("$dir_tmp/md5sum"); |
break; |
case 'MAJ_cat_bl' : |
if (file_exists($bl_categories_enabled)) |
{ |
exec("/bin/sed -i \"/^ossi-/!d\" $bl_categories_enabled"); // keep ossi custom categories |
$pointeur=fopen($bl_categories_enabled, "a+"); |
$fichier=fopen($update_file_cat,"w+"); |
foreach ($_POST as $key => $value) |
case 'Download_list' : |
exec ("sudo /usr/local/bin/alcasar-bl.sh --download"); |
break; |
case 'Active_list' : |
exec ("sudo /usr/local/bin/alcasar-bl.sh --adapt"); |
exec ("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
break; |
case 'Reject_list' : |
unlink ("$dir_tmp/blacklists.tar.gz"); unlink ("$dir_tmp/md5sum"); |
break; |
case 'MAJ_cat_bl' : |
if (file_exists($bl_categories_enabled)) |
{ |
if (strstr($key,'chk-')) |
exec("/bin/sed -i \"/^ossi-/!d\" $bl_categories_enabled"); // keep ossi custom categories |
$pointeur=fopen($bl_categories_enabled, "a+"); |
$fichier=fopen($update_file_cat,"w+"); |
foreach ($_POST as $key => $value) |
{ |
$line=str_replace('chk-','',$key)."\n"; |
fwrite($pointeur,$line); |
if(trim($line) == 'malware' && $_POST['update_cat'] == 1) //auto-update of malware |
if (strstr($key,'chk-')) |
{ |
fputs($fichier, "malware rsync://ftp.ut-capitole.fr/blacklist/dest/malware\n"); |
$line=str_replace('chk-','',$key)."\n"; |
fwrite($pointeur,$line); |
if(trim($line) == 'malware' && $_POST['update_cat'] == 1) //auto-update of malware |
{ |
fputs($fichier, "malware rsync://ftp.ut-capitole.fr/blacklist/dest/malware\n"); |
} |
} |
} |
fclose($pointeur); |
fclose($fichier); |
} |
fclose($pointeur); |
else {echo "$l_error_open_file $bl_categories_enabled";} |
$fichier=fopen($dir_blacklist."ossi-bl/domains","w+"); |
fputs($fichier, form_filter($_POST['OSSI_bl'])); |
fclose($fichier); |
} |
else {echo "$l_error_open_file $bl_categories_enabled";} |
$fichier=fopen($dir_blacklist."ossi-bl/domains","w+"); |
fputs($fichier, form_filter($_POST['OSSI_bl'])); |
fclose($fichier); |
unset($_POST['OSSI_bl']); |
$fichier=fopen($dir_dg."exceptionsitelist","w+"); |
fputs($fichier, form_filter($_POST['BL_rehabilited_domains'])); |
fclose($fichier); |
unset($_POST['BL_rehabilited_domains']); |
$fichier=fopen($dir_dg."exceptioniplist","w+"); |
fputs($fichier, form_filter($_POST['BL_rehabilited_ip'])); |
fclose($fichier); |
unset($_POST['BL_rehabilited_ip']); |
exec ("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
break; |
case 'Specific_filtering' : |
$pureip="-pureip_off"; $safesearch="-safesearch_off"; ; |
foreach ($_POST as $key => $value) |
{ |
if (strstr($key,'chk-ip')) $pureip="-pureip_on"; |
if (strstr($key,'chk-safesearch')) $safesearch="-safesearch_on"; |
} |
exec ("sudo /usr/local/bin/alcasar-url_filter_bl.sh $safesearch $pureip"); |
break; |
case 'MAJ_ossi_file' : |
foreach($_POST as $fichier => $value) |
{ |
if($fichier != "choix") |
unset($_POST['OSSI_bl']); |
$fichier=fopen($dir_dg."exceptionsitelist","w+"); |
fputs($fichier, form_filter($_POST['BL_rehabilited_domains'])); |
fclose($fichier); |
unset($_POST['BL_rehabilited_domains']); |
$fichier=fopen($dir_dg."exceptioniplist","w+"); |
fputs($fichier, form_filter($_POST['BL_rehabilited_ip'])); |
fclose($fichier); |
unset($_POST['BL_rehabilited_ip']); |
exec ("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
break; |
case 'Specific_filtering': |
$bl_pureip='off'; |
$bl_safesearch='off'; |
foreach ($_POST as $key => $value) |
{ |
$action=$_POST[$fichier]; |
if($action == $l_remove) //delete |
if (strstr($key,'chk-ip')) $bl_pureip="on"; |
if (strstr($key,'chk-safesearch')) $bl_safesearch="on"; |
} |
exec ("sudo /usr/local/bin/alcasar-url_filter_bl.sh -safesearch_$bl_safesearch -pureip_$bl_pureip"); |
break; |
case 'MAJ_ossi_file' : |
foreach($_POST as $fichier => $value) |
{ |
if($fichier != "choix") |
{ |
exec("/bin/sed -i ".escapeshellarg("/^$fichier\$/d")." $bl_categories_enabled"); |
exec("/bin/sed -i ".escapeshellarg("/$fichier\$/d")." $bl_categories"); |
exec("rm -rf $dir_blacklist".escapeshellarg($fichier)); |
exec("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
$action=$_POST[$fichier]; |
if($action == $l_remove) //delete |
{ |
exec("/bin/sed -i ".escapeshellarg("/^$fichier\$/d")." $bl_categories_enabled"); |
exec("/bin/sed -i ".escapeshellarg("/$fichier\$/d")." $bl_categories"); |
exec("rm -rf $dir_blacklist".escapeshellarg($fichier)); |
exec("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
} |
if($action == $l_disable) //disable |
{ |
exec("/bin/sed -i ".escapeshellarg("/^$fichier\$/d")." $bl_categories_enabled"); |
exec("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
} |
if($action == $l_enable) //enable |
{ |
file_put_contents ($bl_categories_enabled, $fichier."\n", FILE_APPEND); |
exec("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
} |
} |
if($action == $l_disable) //disable |
} |
break; |
case 'MAJ_ossi_file_upload' : |
$file_name = str_replace (".", "_",basename($_FILES['fichier_ip']['name'])); |
$dest_dir = $dir_blacklist."ossi-bl-".$file_name; # /etc/e2guardian/list/blacklist/ossi-bl-XXXXXXXX |
if((!empty($file_name)) && (!file_exists($dest_dir))) |
{ |
exec("mkdir ".escapeshellarg($dest_dir)); |
$file=$_FILES['fichier_ip']['tmp_name']; |
exec('/usr/bin/dos2unix '.escapeshellarg($file)); |
if(move_uploaded_file($_FILES['fichier_ip']['tmp_name'], $dest_dir."/domains")) // copy in the file "domains" (containing @ip & domain names (like over Toulouse categories)) |
{ |
exec("/bin/sed -i ".escapeshellarg("/^$fichier\$/d")." $bl_categories_enabled"); |
touch ($dest_dir."/urls"); // create the URL file even if it isn't used |
file_put_contents ($bl_categories, $dest_dir."\n", FILE_APPEND); # add to the categories list |
file_put_contents ($bl_categories_enabled, "ossi-bl-".$file_name."\n", FILE_APPEND); //Enabled by default |
exec("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
} |
if($action == $l_enable) //enable |
else |
{ |
file_put_contents ($bl_categories_enabled, $fichier."\n", FILE_APPEND); |
exec("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
exec("rm -rf ".escapeshellarg($dest_dir)); |
echo $l_error_upload; |
} |
} |
} |
break; |
case 'MAJ_ossi_file_upload' : |
$file_name = str_replace (".", "_",basename($_FILES['fichier_ip']['name'])); |
$dest_dir = $dir_blacklist."ossi-bl-".$file_name; # /etc/e2guardian/list/blacklist/ossi-bl-XXXXXXXX |
if((!empty($file_name)) && (!file_exists($dest_dir))) |
{ |
exec("mkdir ".escapeshellarg($dest_dir)); |
$file=$_FILES['fichier_ip']['tmp_name']; |
exec('/usr/bin/dos2unix '.escapeshellarg($file)); |
if(move_uploaded_file($_FILES['fichier_ip']['tmp_name'], $dest_dir."/domains")) // copy in the file "domains" (containing @ip & domain names (like over Toulouse categories)) |
{ |
touch ($dest_dir."/urls"); // create the URL file even if it isn't used |
file_put_contents ($bl_categories, $dest_dir."\n", FILE_APPEND); # add to the categories list |
file_put_contents ($bl_categories_enabled, "ossi-bl-".$file_name."\n", FILE_APPEND); //Enabled by default |
exec("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
} |
else |
{ |
exec("rm -rf ".escapeshellarg($dest_dir)); |
echo $l_error_upload; |
} |
} |
break; |
break; |
} |
?> |
<table width="100%" border="0" cellspacing="0" cellpadding="0"> |
314,7 → 330,7 |
<FORM action='bl_filter.php' method=POST> |
<?php |
if ((file_exists("$dir_tmp/blacklists.tar.gz")) && (file_exists("$dir_tmp/md5sum"))) |
{ |
{ |
echo "$l_fingerprint"; echo_file ("$dir_tmp/md5sum"); |
echo "<br>$l_fingerprint2<a href='http://dsi.ut-capitole.fr/blacklists/download/MD5SUM.LST' target='cat_help' onclick=\"window.open('http://dsi.ut-capitole.fr/blacklists/download/MD5SUM.LST','cat_help','width=600,height=150,toolbar=no,scrollbars=yes,resizable=yes')\" title='verify fingerprint'>dsi.ut-capitole.fr/blacklists/download/MD5SUM.LST</a><br>"; |
echo "<input type='hidden' name='choix' value='Active_list'>"; |
322,12 → 338,12 |
echo "<FORM action='bl_filter.php' method=POST>"; |
echo "<input type='hidden' name='choix' value='Reject_list'>"; |
echo "<input type='submit' onClick=\"this.disabled=true; this.value='$l_load';submit();\" value='$l_reject_bl'></form>"; |
} |
} |
else |
{ |
{ |
echo "<input type='hidden' name='choix' value='Download_list'>"; |
echo "<input type='submit' onClick=\"this.disabled=true; this.value='$l_load';submit();\" value='$l_download_bl'> ($l_warning)</form>"; |
} |
} |
?> |
</td></tr> |
</table><br> |
342,7 → 358,7 |
<?php |
echo "<center>"; |
// total number of IP, DNS & URLs |
$nbDomainNames = exec("wc -l /usr/local/share/dnsmasq-bl/* | tail -n 1 | awk '{print $1}'"); |
$nbDomainNames = exec("wc -l /usr/local/share/unbound-bl/* | tail -n 1 | awk '{print $1}'") / 2; |
$nbUrl = exec("for file in `find /etc/e2guardian/lists/blacklists/ -name 'urls'`; do nb=$((nb+$(wc -l \$file | awk '{print $1}'))); done; echo \$nb"); |
$nbIp = exec("wc -l /usr/local/share/iptables-bl/* | tail -n 1 | awk '{print $1}'"); |
echo "<b>$l_nbDomainNames</b> $nbDomainNames, <b>$l_nbUrl</b> $nbUrl, <b>$l_nbIp</b> $nbIp<br/>"; |
350,11 → 366,11 |
//read & display all BL categories (checked or not) |
$cols=1; |
if (file_exists($bl_categories)) |
{ |
{ |
$bl_files = file($bl_categories); |
$bl_files = preg_grep("/ossi-/", $bl_files, 1); // don't display ossi custom categories |
foreach($bl_files as $fichier => $value) |
{ |
{ |
if ($cols == 1) { echo "<tr>";} |
$categorie=trim(basename($value)); |
echo "<td><a href='bl_categories_help.php?liste=bl&cat=$categorie' target='cat_help' onclick=\"window.open('bl_categories_help.php','cat_help','width=600,height=450,toolbar=no,scrollbars=yes,resizable=yes')\" title='categories help page'>$categorie</a><br>"; |
366,10 → 382,11 |
$cols++; |
if ($cols > 10) { |
echo "</tr>\n"; |
$cols=1; } |
$cols=1; |
} |
} |
else { |
} |
else { |
echo "$l_error_open_file $bl_categories"; |
} |
451,59 → 468,14 |
<input type='hidden' name='choix' value='Specific_filtering'> |
<table width="100%" border=1 cellspacing=0 cellpadding=1> |
<tr><td> |
<input type='checkbox' name='chk-ip' |
<?php |
// verify "pureip" filtering state |
if (file_exists($bannedsite_file)) |
{ |
$pointeur=fopen($bannedsite_file,"r"); |
while (!feof ($pointeur)) |
{ |
$ligne=fgets($pointeur, 4096); |
if ($ligne) |
{ |
if (preg_match('/^\*ip$/',$ligne, $r)) |
{ |
echo " checked"; |
break; |
} |
} |
} |
fclose($pointeur); |
} |
else { |
echo "$l_error_open_file $bannedsite_file"; |
} |
echo "> $l_ip_filtering"; |
?> |
<input type='checkbox' name='chk-ip' <?= $bl_pureip == 'on' ? 'checked' : ''; ?>><?= $l_ip_filtering; ?> |
</td></tr> |
<tr><td> |
<input type='checkbox' name='chk-safesearch' |
<?php |
// verify "safesearch" filtering state |
if (file_exists($urlregex_file)) |
{ |
$pointeur=fopen($urlregex_file,"r"); |
while (!feof ($pointeur)) |
{ |
$ligne=fgets($pointeur, 4096); |
if ($ligne) |
{ |
if (preg_match('/^\"\(\^http\:\/\/\[0\-9a\-z\]\+\\\.google/',$ligne, $r)) |
{ |
echo " checked"; |
break; |
} |
} |
} |
fclose($pointeur); |
} |
else { |
echo "$l_error_open_file $urlregex_file"; |
} |
echo "> $l_safe_searching<tr><td>"; |
echo "<input type='submit' onClick=\"this.disabled=true; this.value='$l_load';submit();\" value='$l_record'></td></tr>"; |
?> |
<input type='checkbox' name='chk-safesearch' <?= $bl_safesearch == 'on' ? 'checked' : ''; ?>><?= $l_safe_searching; ?> |
</tr></td> |
<tr><td> |
<?= "<input type='submit' onClick=\"this.disabled=true; this.value='$l_load';submit();\" value='$l_record'>"; ?> |
</td></tr> |
</table> |
</form> |
</BODY> |
/web/acc/admin/network.php |
---|
226,10 → 226,6 |
$field = preg_split("/\s+/",$line); |
$ip_addr = $field[0]; |
$host_name = trim($field[1]); |
if (strcmp($add_ip, $ip_addr) === 0) { |
$insert = false; |
break; |
} |
if (strcasecmp($add_host, $host_name) === 0) { |
$insert = false; |
break; |
237,7 → 233,7 |
} |
} |
if ($insert) { |
exec("sudo /usr/local/bin/alcasar-dns-local.sh -add $add_ip $add_host"); |
exec("sudo /usr/local/bin/alcasar-dns-local.sh --add $add_ip $add_host"); |
} |
} |
} |
272,8 → 268,8 |
move_uploaded_file($_FILES['key']['tmp_name'], $keypath); |
move_uploaded_file($_FILES['crt']['tmp_name'], $crtpath); |
exec("sudo alcasar-importcert.sh -i $crtpath -k $keypath -c $scpath"); |
if (file_exists($crtpath)) unlink($crtpath); |
if (file_exists($keypath)) unlink($keypath); |
if (file_exists($crtpath)) unlink($crtpath); |
if (file_exists($keypath)) unlink($keypath); |
if (file_exists($scpath)) unlink($scpath); |
} |
} |
342,7 → 338,7 |
$domainName = $_POST['domainname']; |
exec('sudo /usr/local/bin/alcasar-letsencrypt.sh --issue --email '.escapeshellarg($email).' --domain '.escapeshellarg($domainName), $output, $exitCode); |
$cmdResponse = implode("<br>\n", $output); |
} |
if ($choix === 'le_renewCert') { |
/web/acc/admin/services.php |
---|
1,5 → 1,5 |
<?php |
/* written by steweb57 & Rexy */ |
/* written by steweb57 & Rexy */ |
# Choice of language |
$Language = 'en'; |
if(isset($_SERVER['HTTP_ACCEPT_LANGUAGE'])){ |
31,10 → 31,11 |
$l_vnstat = "Grapheur de flux réseau"; |
$l_havp = "Proxy Antivirus"; |
$l_tinyproxy = "Proxy HTTP léger"; |
$l_dnsmasq = "Serveur DNS principal"; |
$l_dnsmasq_blacklist = "Serveur DNS pour la Blacklist"; |
$l_dnsmasq_whitelist = "Serveur DNS pour la Whitelist"; |
$l_dnsmasq_blackhole = "Serveur DNS 'trou noir'"; |
$l_unbound = "Serveur DNS principal"; |
$l_unbound_blacklist = "Serveur DNS pour la Blacklist"; |
$l_unbound_whitelist = "Serveur DNS pour la Whitelist"; |
$l_dnsmasq_whitelist = "Serveur DNS pour la Whitelist (IPSET)"; |
$l_unbound_blackhole = "Serveur DNS 'trou noir'"; |
$l_ulogd_ssh = "journalisation des accès par SSH"; |
$l_ulogd_ext_access = "journalisation des tentatives d'accès externes"; |
$l_ulogd_traceability = "journalisation des connexions WEB filtrés"; |
42,7 → 43,7 |
$l_stop_restart = "Arret et redémarrage du système"; |
$l_halt = "Arréter le système"; |
$l_reboot = "Relancer le système"; |
} else { |
$l_services_title = "Services configuration"; |
$l_main_services = "Main services"; |
69,10 → 70,11 |
$l_vnstat = "Network grapher"; |
$l_havp = "Antivirus Proxy"; |
$l_tinyproxy = "Light HTTP Proxy"; |
$l_dnsmasq = "Main DNS server"; |
$l_dnsmasq_blacklist = "Blacklist DNS server"; |
$l_dnsmasq_whitelist = "Whitelist DNS server"; |
$l_dnsmasq_blackhole = "Blackhole DNS server"; |
$l_unbound = "Main DNS server"; |
$l_unbound_blacklist = "Blacklist DNS server"; |
$l_unbound_whitelist = "Whitelist DNS server"; |
$l_dnsmasq_whitelist = "Whitelist DNS server (IPSET)"; |
$l_unbound_blackhole = "Blackhole DNS server"; |
$l_ulogd_ssh = "SSH access logging process"; |
$l_ulogd_ext_access = "Extern access attempts logging process"; |
$l_ulogd_traceability = "Filtering WEB access logging process"; |
102,7 → 104,7 |
if (($action == "start")||($action == "stop")||($action == "restart")){ |
exec("sudo /usr/bin/systemctl $action ".escapeshellarg($service), $retval, $retstatus); |
if ($service == "sshd"){ // in order to keep that conf for SSH at next reboot |
if ($action == "start"){ |
if ($action == "start"){ |
exec("sudo /usr/bin/systemctl enable ".escapeshellarg($service)); |
file_put_contents(CONF_FILE, str_replace('SSH=off', 'SSH=on', file_get_contents(CONF_FILE))); |
exec("sudo /usr/local/bin/alcasar-iptables.sh"); |
135,7 → 137,7 |
//------------------------------- |
// Actions on services |
//------------------------------- |
$autorizeService = array("radiusd","chilli","mysqld","lighttpd","dnsmasq","ulogd-ssh","ulogd-ext-access","ulogd-traceability","dnsmasq-blacklist","dnsmasq-whitelist","dnsmasq-blackhole","e2guardian","havp","tinyproxy","freshclam","sshd","ntpd","fail2ban","nfsen","vnstat"); |
$autorizeService = array("radiusd","chilli","mysqld","lighttpd","unbound-forward","ulogd-ssh","ulogd-ext-access","ulogd-traceability","unbound-blacklist","unbound-whitelist","dnsmasq-whitelist","unbound-blackhole","e2guardian","havp","tinyproxy","freshclam","sshd","ntpd","fail2ban","nfsen","vnstat"); |
$autorizeAction = array("start","stop","restart"); |
if (isset($_GET['service'])&&(in_array($_GET['service'], $autorizeService))) { |
168,15 → 170,16 |
$MainServiceStatus['radiusd'] = checkServiceStatus("radiusd"); |
$MainServiceStatus['mysqld'] = checkServiceStatus("mysqld"); |
$MainServiceStatus['lighttpd'] = checkServiceStatus("lighttpd"); |
$MainServiceStatus['dnsmasq'] = checkServiceStatus("dnsmasq"); |
$MainServiceStatus['unbound'] = checkServiceStatus("unbound-forward"); |
$MainServiceStatus['ulogd_ssh'] = checkServiceStatus("ulogd-ssh"); |
$MainServiceStatus['ulogd_ext_access'] = checkServiceStatus("ulogd-ext-access"); |
$MainServiceStatus['ulogd_traceability'] = checkServiceStatus("ulogd-traceability"); |
$FilterServiceStatus = array(); |
$FilterServiceStatus['dnsmasq_blacklist'] = checkServiceStatus("dnsmasq-blacklist"); |
$FilterServiceStatus['unbound_blacklist'] = checkServiceStatus("unbound-blacklist"); |
$FilterServiceStatus['unbound_whitelist'] = checkServiceStatus("unbound-whitelist"); |
$FilterServiceStatus['dnsmasq_whitelist'] = checkServiceStatus("dnsmasq-whitelist"); |
$FilterServiceStatus['dnsmasq_blackhole'] = checkServiceStatus("dnsmasq-blackhole"); |
$FilterServiceStatus['unbound_blackhole'] = checkServiceStatus("unbound-blackhole"); |
$FilterServiceStatus['e2guardian'] = checkServiceStatus("e2guardian"); |
$FilterServiceStatus['havp'] = checkServiceStatus("havp"); |
$FilterServiceStatus['tinyproxy'] = checkServiceStatus("tinyproxy"); |
/web/acc/admin/wl_filter.php |
---|
9,7 → 9,7 |
<? |
function form_filter ($form_content) |
{ |
// réencodage iso + format unix + rc fin de ligne (ouf...) |
// réencodage iso + format unix + rc fin de ligne (ouf...) |
$list = str_replace("\r\n", "\n", utf8_decode($form_content)); |
if (strlen($list) != 0){ |
if ($list[strlen($list)-1] != "\n") { $list[strlen($list)]="\n";} ;} ; |
37,22 → 37,22 |
} |
} |
function echo_file ($filename) |
{ |
if (file_exists($filename)) |
{ |
if (file_exists($filename)) |
if (filesize($filename) != 0) |
{ |
if (filesize($filename) != 0) |
{ |
$pointeur=fopen($filename,"r"); |
$tampon = fread($pointeur, filesize($filename)); |
fclose($pointeur); |
echo $tampon; |
} |
} |
} |
else |
{ |
{ |
echo "$filename doesn't exist"; |
} |
} |
} |
function echo_ip_file ($filename) |
{ |
$filename = escapeshellarg($filename); |
68,7 → 68,7 |
if(isset($_SERVER['HTTP_ACCEPT_LANGUAGE'])){ |
$Langue = explode(",",$_SERVER['HTTP_ACCEPT_LANGUAGE']); |
$Language = strtolower(substr(chop($Langue[0]),0,2)); |
} |
} |
if($Language == 'fr'){ |
$l_wl="Liste blanche générale"; |
$l_load="Chargement..."; |
76,7 → 76,7 |
$l_wl_categories="Sélectionnez les catégories à autoriser"; |
$l_specific_filtering="Filtrage special"; |
$l_add_to_wl="Noms de domaine ou adresses IP à ajouter à la liste blanche"; |
$l_one_dns_ip="Entrez un nom de domaine ou une adresse IP ou une adresse de réseau par ligne<br>exemple (domaine) : .domaine.org - exemple (ip) : 61.54.52.56 - exemple (réseau) : 172.16.0.0/16"; |
$l_one_dns_ip="Entrez un nom de domaine ou une adresse IP ou une adresse de réseau par ligne<br>exemple (domaine) : domaine.org. - exemple (ip) : 61.54.52.56 - exemple (réseau) : 172.16.0.0/16"; |
$l_record="Enregistrer les modifications"; |
$l_wait="Une fois validées, 10 secondes sont nécessaires pour traiter vos modifications"; |
$l_safe_searching="Activer le contrôle scolaire/parental pour 'YouTube' et pour les moteurs de recherche 'Google', 'Bing' et 'Qwant'."; |
107,7 → 107,7 |
$l_specific_filtering="Specific filtering"; |
$l_allowed_dns="Allowed domain names"; |
$l_add_to_wl="Domain names or IP addresses to add to the whitelist"; |
$l_one_dns_ip="Enter one domain name or one IP address or one network address per row <br>example (domain): .domain.org - example (ip): 61.54.56.52 - example (network) : 172.16.0.0/16"; |
$l_one_dns_ip="Enter one domain name or one IP address or one network address per row <br>example (domain): domain.org. - example (ip): 61.54.56.52 - example (network) : 172.16.0.0/16"; |
$l_record="Save changes"; |
$l_wait="Once validated, 10 seconds are necessary to compute your modifications"; |
$l_safe_searching="Enabling school/parental control for 'YouTube' and for the search engines 'Google', 'Bing' and 'Qwant'"; |
135,127 → 135,137 |
$dir_blacklist=$dir_dg."blacklists/"; |
$dir_wl_ip="/usr/local/share/iptables-wl/"; |
$dir_wl_ip_enabled= "/usr/local/share/iptables-wl-enabled/"; |
$dir_wl_domain_names= "/usr/local/share/dnsmasq-wl/"; |
$dir_wl_domain_names_enabled= "/usr/local/share/dnsmasq-wl-enabled/"; |
$dir_wl_domain_names= "/usr/local/share/unbound-wl/"; |
$dir_wl_domain_names_enabled= "/usr/local/share/unbound-wl-enabled/"; |
$wl_categories=$dir_etc."alcasar-wl-categories"; |
$wl_categories_enabled=$dir_etc."alcasar-wl-categories-enabled"; |
$conf_file=$dir_etc."alcasar.conf"; |
$iptables_safesearch_file=$dir_wl_ip_enabled."ossi-ip-safesearch"; |
$domainfilter_file="/etc/unbound/conf.d/whitelist/domainfilter.conf"; |
$bannedsite_file=$dir_dg."bannedsitelist"; |
$dir_tmp="/tmp/blacklists"; |
$wl_safesearch="off"; |
# default values |
if (is_file ($conf_file)) |
{ |
{ |
$tab=file($conf_file); |
if ($tab) |
{ |
foreach ($tab as $line) |
{ |
foreach ($tab as $line) |
{ |
$field=explode("=", $line); |
if ($field[0] == "PRIVATE_IP") |
{ |
$PRIVATE_IP_MASK=trim($field[1]); |
$tmp = explode("/",$PRIVATE_IP_MASK); |
$PRIVATE_IP=$tmp[0]; |
} |
switch ($field[0]) { |
case 'PRIVATE_IP': |
$PRIVATE_IP_MASK=trim($field[1]); |
$tmp = explode("/",$PRIVATE_IP_MASK); |
$PRIVATE_IP=$tmp[0]; |
break; |
case 'WL_SAFESEARCH': |
if (strtolower(trim($field[1])) == 'on') { |
$wl_safesearch='on'; |
} |
break; |
} |
} |
} |
} |
else { echo "$l_error_open_file $conf_file";} |
if (isset($_POST['choix'])){ $choix=$_POST['choix']; } else { $choix=""; } |
switch ($choix) |
{ |
case 'Download_list' : |
exec ("sudo /usr/local/bin/alcasar-bl.sh --download"); |
break; |
case 'Active_list' : |
exec ("sudo /usr/local/bin/alcasar-bl.sh --adapt"); |
exec ("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
break; |
case 'Reject_list' : |
unlink ("$dir_tmp/blacklists.tar.gz"); unlink ("$dir_tmp/md5sum"); |
break; |
case 'MAJ_cat_wl' : |
if (file_exists($wl_categories_enabled)) |
{ |
exec("/bin/sed -i \"/^ossi-/!d\" $wl_categories_enabled"); // keep ossi custom categories |
$pointeur=fopen($wl_categories_enabled, "a+"); |
foreach ($_POST as $key => $value) |
case 'Download_list' : |
exec ("sudo /usr/local/bin/alcasar-bl.sh --download"); |
break; |
case 'Active_list' : |
exec ("sudo /usr/local/bin/alcasar-bl.sh --adapt"); |
exec ("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
break; |
case 'Reject_list' : |
unlink ("$dir_tmp/blacklists.tar.gz"); unlink ("$dir_tmp/md5sum"); |
break; |
case 'MAJ_cat_wl' : |
if (file_exists($wl_categories_enabled)) |
{ |
if (strstr($key,'chk-')) |
exec("/bin/sed -i \"/^ossi-/!d\" $wl_categories_enabled"); // keep ossi custom categories |
$pointeur=fopen($wl_categories_enabled, "a+"); |
foreach ($_POST as $key => $value) |
{ |
$line=str_replace('chk-','',$key)."\n"; |
fwrite($pointeur,$line); |
if (strstr($key,'chk-')) |
{ |
$line=str_replace('chk-','',$key)."\n"; |
fwrite($pointeur,$line); |
} |
} |
fclose($pointeur); |
} |
fclose($pointeur); |
} |
else {echo "$l_error_open_file $wl_categories_enabled";} |
$fichier=fopen($dir_blacklist."ossi-wl/domains","w+"); |
fputs($fichier, form_filter($_POST['OSSI_wl'])); |
fclose($fichier); |
unset($_POST['OSSI_wl']); |
exec ("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
break; |
case 'Specific_filtering' : |
$safesearch="-safesearch_off"; ; |
foreach ($_POST as $key => $value) |
{ |
if (strstr($key,'chk-safesearch')) $safesearch="-safesearch_on"; |
} |
exec ("sudo /usr/local/bin/alcasar-url_filter_wl.sh $safesearch"); |
break; |
case 'MAJ_ossi_file' : |
foreach($_POST as $fichier => $value) |
{ |
if($fichier != "choix") |
else {echo "$l_error_open_file $wl_categories_enabled";} |
$fichier=fopen($dir_blacklist."ossi-wl/domains","w+"); |
fputs($fichier, form_filter($_POST['OSSI_wl'])); |
fclose($fichier); |
unset($_POST['OSSI_wl']); |
exec ("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
break; |
case 'Specific_filtering' : |
$wl_safesearch='off'; |
foreach ($_POST as $key => $value) |
{ |
$action=$_POST[$fichier]; |
if($action == $l_remove) //delete |
if (strstr($key,'chk-safesearch')) { |
$wl_safesearch='on'; |
} |
} |
exec ("sudo /usr/local/bin/alcasar-url_filter_wl.sh -safesearch_$wl_safesearch"); |
break; |
case 'MAJ_ossi_file' : |
foreach($_POST as $fichier => $value) |
{ |
if($fichier != "choix") |
{ |
exec("/bin/sed -i ".escapeshellarg("/^$fichier\$/d")." $wl_categories_enabled"); |
exec("/bin/sed -i ".escapeshellarg("/^$fichier\$/d")." $wl_categories"); |
exec("rm -rf ".escapeshellarg("$dir_blacklist$fichier")); |
exec("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
$action=$_POST[$fichier]; |
if($action == $l_remove) //delete |
{ |
exec("/bin/sed -i ".escapeshellarg("/^$fichier\$/d")." $wl_categories_enabled"); |
exec("/bin/sed -i ".escapeshellarg("/^$fichier\$/d")." $wl_categories"); |
exec("rm -rf ".escapeshellarg("$dir_blacklist$fichier")); |
exec("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
} |
if($action == $l_disable) //disable |
{ |
exec("/bin/sed -i ".escapeshellarg("/^$fichier\$/d")." $wl_categories_enabled"); |
exec("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
} |
if($action == $l_enable) //enable |
{ |
file_put_contents($wl_categories_enabled, $fichier."\n", FILE_APPEND); |
exec("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
} |
} |
if($action == $l_disable) //disable |
} |
break; |
case 'MAJ_ossi_file_upload' : |
$file_name = str_replace (".", "_",basename($_FILES['fichier_ip']['name'])); |
if(!empty($file_name)) |
{ |
$dest_dir = $dir_blacklist."ossi-wl-".$file_name; |
exec("mkdir ".escapeshellarg($dest_dir)); |
$file=$_FILES['fichier_ip']['tmp_name']; |
exec('/usr/bin/dos2unix '.escapeshellarg($file)); |
if(move_uploaded_file($_FILES['fichier_ip']['tmp_name'], $dest_dir."/domains")) |
{ |
exec("/bin/sed -i ".escapeshellarg("/^$fichier\$/d")." $wl_categories_enabled"); |
exec("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
touch ($dest_dir."/urls"); // create the URL file even if it isn't used |
file_put_contents ($wl_categories, $dest_dir."\n", FILE_APPEND); |
file_put_contents ($wl_categories_enabled, "ossi-wl-".$file_name."\n", FILE_APPEND); //Enabled by default |
exec ("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
} |
if($action == $l_enable) //enable |
else |
{ |
file_put_contents($wl_categories_enabled, $fichier."\n", FILE_APPEND); |
exec("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
exec("rm -rf ".escapeshellarg($dest_dir)); |
echo $l_error_upload; |
} |
} |
} |
break; |
case 'MAJ_ossi_file_upload' : |
$file_name = str_replace (".", "_",basename($_FILES['fichier_ip']['name'])); |
if(!empty($file_name)) |
{ |
$dest_dir = $dir_blacklist."ossi-wl-".$file_name; |
exec("mkdir ".escapeshellarg($dest_dir)); |
$file=$_FILES['fichier_ip']['tmp_name']; |
exec('/usr/bin/dos2unix '.escapeshellarg($file)); |
if(move_uploaded_file($_FILES['fichier_ip']['tmp_name'], $dest_dir."/domains")) |
{ |
touch ($dest_dir."/urls"); // create the URL file even if it isn't used |
file_put_contents ($wl_categories, $dest_dir."\n", FILE_APPEND); |
file_put_contents ($wl_categories_enabled, "ossi-wl-".$file_name."\n", FILE_APPEND); //Enabled by default |
exec ("sudo /usr/local/bin/alcasar-bl.sh --reload"); |
} |
else |
{ |
exec("rm -rf ".escapeshellarg($dest_dir)); |
echo $l_error_upload; |
} |
} |
break; |
break; |
} |
?> |
<table width="100%" border="0" cellspacing="0" cellpadding="0"> |
269,19 → 279,19 |
<?php |
echo "<center>"; |
// total number of IP, DNS & URLs |
$nbDomainNames = exec("wc -l /usr/local/share/dnsmasq-wl/* | tail -n 1 | awk '{print $1}'"); |
$nbDomainNames = exec("wc -l $dir_wl_domain_names* | tail -n 1 | awk '{print $1}'"); |
$nbUrl = "0"; |
$nbIp = exec("wc -l /usr/local/share/iptables-wl/* | tail -n 1 | awk '{print $1}'"); |
$nbIp = exec("wc -l $dir_wl_ip* | tail -n 1 | awk '{print $1}'"); |
echo "<b>$l_nbDomainNames</b> $nbDomainNames, <b>$l_nbUrl</b> $nbUrl, <b>$l_nbIp</b> $nbIp<br/>"; |
echo "$l_wl_categories</center></td></tr>"; |
//read & display all WL categories (checked or not) |
$cols=1; |
if (file_exists($wl_categories)) |
{ |
{ |
$wl_files = file($wl_categories); |
$wl_files = preg_grep("/ossi-/", $wl_files, 1); // don't display ossi custom categories |
foreach($wl_files as $fichier => $value) |
{ |
{ |
if ($cols == 1) { echo "<tr>";} |
$categorie=trim(basename($value)); |
echo "<td><a href='bl_categories_help.php?liste=wl&cat=$categorie' target='cat_help' onclick=window.open('bl_categories_help.php','cat_help','width=600,height=450,toolbar=no,scrollbars=yes,resizable=yes') title='categories help page'>$categorie</a><br>"; |
293,10 → 303,11 |
$cols++; |
if ($cols > 10) { |
echo "</tr>"; |
$cols=1; } |
$cols=1; |
} |
} |
else { |
} |
else { |
echo "$l_error_open_file $wl_categories"; |
} |
echo "<tr><td valign='middle' align='left' colspan=10>"; |
350,17 → 361,11 |
<FORM action='wl_filter.php' method='POST'> |
<input type='hidden' name='choix' value='Specific_filtering'> |
<tr><td> |
<input type='checkbox' name='chk-safesearch' |
<?php |
// verify "safesearch" filtering state |
if (file_exists($iptables_safesearch_file)) |
{ |
echo " checked"; |
} |
echo "> $l_safe_searching<tr><td>"; |
echo "<input type='submit' onClick=\"this.disabled=true; this.value='$l_load';submit();\" value='$l_record'></td></tr>"; |
?> |
</FORM> |
<input type='checkbox' name='chk-safesearch' <?= $wl_safesearch == 'on' ? 'checked' : ''; ?>><?= $l_safe_searching; ?> |
</tr></td> |
<tr><td> |
<?= "<input type='submit' onClick=\"this.disabled=true; this.value='$l_load';submit();\" value='$l_record'>"; ?> |
</td></tr></FORM> |
</TABLE> |
</BODY> |
</HTML> |