476,14 → 476,19 |
echo " <span>$l_explain_net_pb</span>"; |
} |
} |
else{ |
else{ # the user is intercepted |
exec("sudo /usr/sbin/ipset list not_filtered | grep $remote_ip | wc -l 2>&1", $ipset_not_filtered); |
# if user is in "ipset_not_filtered" then he must refresh its dns cache (we are in the interception process) |
if ($ipset_not_filtered[0] == '1'){ |
echo "<script>window.location.reload(true)</script>"; # force DNS request |
} |
# if user need to be warned that someone reads his logs |
if(isset($_GET['warn']) && isset($_GET['url']) && $_GET['warn'] == '1'){ |
if (isset($_GET['warn']) && isset($_GET['url']) && $_GET['warn'] == '1'){ |
echo " |
<div id=\"cadre_titre\" class=\"titre_refus\"> |
<p id=\"acces_controle\" class=\"titre_refus\">$l_title_warn</p>"; |
} |
else{ |
else{ # the user is blacklisted (or whitelisted) |
echo " |
<div id=\"cadre_titre\" class=\"titre_refus\"> |
<p id=\"acces_controle\" class=\"titre_refus\">$l_title</p>"; |
605,12 → 610,14 |
if (($network_pb)&&(! $direct_access)) { |
echo " <span>Diagnostic : $diagnostic</span>"; |
} |
echo "</div>"; |
if($direct_access){ # display the admin logo (wheel) at the bottom right |
echo "<div id=\"corner\">"; |
echo "<div id=\"adm\" class=\"corn\">"; |
echo "<a href=\"https://$hostname/acc/\"><img src=\"$img_rep$img_adm\"></a>"; |
echo "</div>"; |
echo "</div>"; |
} |
?> |
</div> |
<div id="corner"> |
<div id="adm" class="corn"> |
<a href="https://<?php echo $hostname; ?>/acc/"><img src=<?php echo $img_rep.''.$img_adm; ?>></a> |
</div> |
</div> |
</body> |
</html> |