aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--config/havp/havp.inc2
-rw-r--r--config/mailreport/mail_reports.inc1
-rw-r--r--config/mailscanner/mailscanner.inc13
-rw-r--r--config/snort/snort_alerts.php97
-rw-r--r--config/snort/snort_barnyard.php36
-rw-r--r--config/snort/snort_blocked.php59
-rw-r--r--config/snort/snort_check_for_rule_updates.php16
-rw-r--r--config/snort/snort_define_servers.php16
-rw-r--r--config/snort/snort_download_updates.php22
-rw-r--r--config/snort/snort_interfaces.php54
-rw-r--r--config/snort/snort_interfaces_edit.php112
-rw-r--r--config/snort/snort_interfaces_global.php94
-rw-r--r--config/snort/snort_interfaces_suppress.php22
-rw-r--r--config/snort/snort_interfaces_suppress_edit.php36
-rw-r--r--config/snort/snort_interfaces_whitelist.php22
-rw-r--r--config/snort/snort_interfaces_whitelist_edit.php54
-rw-r--r--config/snort/snort_preprocessors.php130
-rw-r--r--config/snort/snort_rules.php22
-rw-r--r--config/snort/snort_rulesets.php22
-rw-r--r--config/squid-reverse/proxy_monitor.sh4
-rw-r--r--config/squid3/proxy_monitor.sh5
-rw-r--r--config/varnish3/varnish.inc4
-rw-r--r--config/widget-snort/snort_alerts.widget.php126
-rw-r--r--pkg_config.8.xml13
-rw-r--r--pkg_config.8.xml.amd6413
25 files changed, 516 insertions, 479 deletions
diff --git a/config/havp/havp.inc b/config/havp/havp.inc
index 9dc7b3dd..36c053c9 100644
--- a/config/havp/havp.inc
+++ b/config/havp/havp.inc
@@ -886,7 +886,7 @@ function havp_config_freshclam()
case 'sa': $conf[] = "DatabaseMirror clamav.dial-up.net"; break; # south africa
case 'tw': $conf[] = "DatabaseMirror clamav.cs.pu.edu.tw"; break; # taiwan
case 'uk': $conf[] = "DatabaseMirror clamav.oucs.ox.ac.uk"; break; # united kingdom
- case 'us': $conf[] = "DatabaseMirror clamav.catt.com "; break; # united states
+ case 'us': $conf[] = "DatabaseMirror db.us.clamav.net "; break; # united states
default: break;
}
}
diff --git a/config/mailreport/mail_reports.inc b/config/mailreport/mail_reports.inc
index 48fbc868..8ab31301 100644
--- a/config/mailreport/mail_reports.inc
+++ b/config/mailreport/mail_reports.inc
@@ -213,6 +213,7 @@ function mail_report_generate_graph($database, $style, $graph, $start, $end) {
require_once("filter.inc");
require_once("shaper.inc");
require_once("rrd.inc");
+ global $g;
$pgtitle = array(gettext("System"),gettext("RRD Graphs"),gettext("Image viewer"));
diff --git a/config/mailscanner/mailscanner.inc b/config/mailscanner/mailscanner.inc
index 6a286e5c..3ff4cd40 100644
--- a/config/mailscanner/mailscanner.inc
+++ b/config/mailscanner/mailscanner.inc
@@ -376,13 +376,12 @@ Country Sub-Domains List = %etc-dir%/country.domains.conf
include("mailscanner.conf.template");
#write files
conf_mount_rw();
- if (!is_dir("/var/spool/MailScanner/incoming")){
- mkdir("/var/spool/MailScanner/incoming", 0755,true);
- chown ('/var/spool/MailScanner/incoming','postfix');
- }
- if (!is_dir("/var/spool/MailScanner/quarantine")){
- mkdir("/var/spool/MailScanner/quarantine", 0755,true);
- chown ('/var/spool/MailScanner/quarantine','postfix');
+ $msc_dirs=array("incoming", "incoming/Locks", "quarantine");
+ foreach ($msc_dirs as $msc_dir){
+ if (!is_dir("/var/spool/MailScanner/{$msc_dir}")){
+ mkdir("/var/spool/MailScanner/{$msc_dir}", 0755,true);
+ chown ("/var/spool/MailScanner/{$msc_dir}",'postfix');
+ }
}
chown ('/var/spool/postfix','postfix');
diff --git a/config/snort/snort_alerts.php b/config/snort/snort_alerts.php
index 663e7621..e6ebefeb 100644
--- a/config/snort/snort_alerts.php
+++ b/config/snort/snort_alerts.php
@@ -47,7 +47,7 @@ if (empty($instanceid))
$instanceid = 0;
if (!is_array($config['installedpackages']['snortglobal']['rule']))
- $config['installedpackages']['snortglobal']['rule'] = array();
+ $config['installedpackages']['snortglobal']['rule'] = array();
$a_instance = &$config['installedpackages']['snortglobal']['rule'];
$snort_uuid = $a_instance[$instanceid]['uuid'];
$if_real = snort_get_real_interface($a_instance[$instanceid]['interface']);
@@ -75,13 +75,13 @@ if ($_POST['save']) {
}
if ($_POST['todelete'] || $_GET['todelete']) {
- $ip = "";
- if($_POST['todelete'])
- $ip = $_POST['todelete'];
- else if($_GET['todelete'])
- $ip = $_GET['todelete'];
- if (is_ipaddr($ip))
- exec("/sbin/pfctl -t snort2c -T delete {$ip}");
+ $ip = "";
+ if($_POST['todelete'])
+ $ip = $_POST['todelete'];
+ else if($_GET['todelete'])
+ $ip = $_GET['todelete'];
+ if (is_ipaddr($ip))
+ exec("/sbin/pfctl -t snort2c -T delete {$ip}");
}
if ($_GET['act'] == "addsuppress" && is_numeric($_GET['sidid']) && is_numeric($_GET['gen_id'])) {
@@ -174,34 +174,34 @@ if ($pconfig['arefresh'] == 'on')
<?php if($pfsense_stable == 'yes'){echo '<p class="pgtitle">' . $pgtitle . '</p>';}
/* Display Alert message */
- if ($input_errors) {
- print_input_errors($input_errors); // TODO: add checks
- }
+ if ($input_errors) {
+ print_input_errors($input_errors); // TODO: add checks
+ }
?>
<form action="/snort/snort_alerts.php" method="post" id="formalert">
<table width="100%" border="0" cellpadding="0" cellspacing="0">
<tr><td>
<?php
- $tab_array = array();
- $tab_array[0] = array(gettext("Snort Interfaces"), false, "/snort/snort_interfaces.php");
- $tab_array[1] = array(gettext("Global Settings"), false, "/snort/snort_interfaces_global.php");
- $tab_array[2] = array(gettext("Updates"), false, "/snort/snort_download_updates.php");
- $tab_array[3] = array(gettext("Alerts"), true, "/snort/snort_alerts.php?instance={$instanceid}");
- $tab_array[4] = array(gettext("Blocked"), false, "/snort/snort_blocked.php");
- $tab_array[5] = array(gettext("Whitelists"), false, "/snort/snort_interfaces_whitelist.php");
- $tab_array[6] = array(gettext("Suppress"), false, "/snort/snort_interfaces_suppress.php");
- display_top_tabs($tab_array);
+ $tab_array = array();
+ $tab_array[0] = array(gettext("Snort Interfaces"), false, "/snort/snort_interfaces.php");
+ $tab_array[1] = array(gettext("Global Settings"), false, "/snort/snort_interfaces_global.php");
+ $tab_array[2] = array(gettext("Updates"), false, "/snort/snort_download_updates.php");
+ $tab_array[3] = array(gettext("Alerts"), true, "/snort/snort_alerts.php?instance={$instanceid}");
+ $tab_array[4] = array(gettext("Blocked"), false, "/snort/snort_blocked.php");
+ $tab_array[5] = array(gettext("Whitelists"), false, "/snort/snort_interfaces_whitelist.php");
+ $tab_array[6] = array(gettext("Suppress"), false, "/snort/snort_interfaces_suppress.php");
+ display_top_tabs($tab_array);
?>
</td></tr>
<tr>
<td>
<table class="tabcont" width="100%" border="0" cellspacing="0" cellpadding="0">
<tr>
- <td width="22%" class="listtopic">Last <?=$anentries;?> Alert Entries.</td>
- <td width="78%" class="listtopic">Latest Alert Entries Are Listed First.</td>
+ <td width="22%" class="listtopic"><?php printf(gettext('Last %s Alert Entries.'),$anentries); ?></td>
+ <td width="78%" class="listtopic"><?php echo gettext('Latest Alert Entries Are Listed First.'); ?></td>
</tr>
<tr>
- <td width="22%" class="vncell">Instance to inspect</td>
+ <td width="22%" class="vncell"><?php echo gettext('Instance to inspect'); ?></td>
<td width="78%" class="vtable">
<br/> <select name="instance" id="instance" class="formselect" onChange="document.getElementById('formalert').submit()">
<?php
@@ -212,27 +212,27 @@ if ($pconfig['arefresh'] == 'on')
echo "<option value='{$id}' {$selected}> (" . snort_get_friendly_interface($instance['interface']) . "){$instance['descr']}</option>\n";
}
?>
- </select><br/> Choose which instance alerts you want to inspect.
+ </select><br/> <?php echo gettext('Choose which instance alerts you want to inspect.'); ?>
</td>
<tr>
- <td width="22%" class="vncell">Save or Remove Logs</td>
+ <td width="22%" class="vncell"><?php echo gettext('Save or Remove Logs'); ?></td>
<td width="78%" class="vtable">
- <input name="download" type="submit" class="formbtn" value="Download"> All
- log files will be saved. <a href="/snort/snort_alerts.php?action=clear&instance=<?=$instanceid;?>">
+ <input name="download" type="submit" class="formbtn" value="Download"> <?php echo gettext('All ' .
+ 'log files will be saved.'); ?> <a href="/snort/snort_alerts.php?action=clear&instance=<?=$instanceid;?>">
<input name="delete" type="button" class="formbtn" value="Clear"
onclick="return confirm('Do you really want to remove all instance logs?')"></a>
- <span class="red"><strong>Warning:</strong></span> all log files will be deleted.
+ <span class="red"><strong><?php echo gettext('Warning:'); ?></strong></span> <?php echo ' ' . gettext('all log files will be deleted.'); ?>
</td>
</tr>
<tr>
- <td width="22%" class="vncell">Auto Refresh and Log View</td>
+ <td width="22%" class="vncell"><?php echo gettext('Auto Refresh and Log View'); ?></td>
<td width="78%" class="vtable">
<input name="save" type="submit" class="formbtn" value="Save">
- Refresh <input name="arefresh" type="checkbox" value="on"
+ <?php echo gettext('Refresh'); ?> <input name="arefresh" type="checkbox" value="on"
<?php if ($config['installedpackages']['snortglobal']['alertsblocks']['arefresh']=="on") echo "checked"; ?>>
- <strong>Default</strong> is <strong>ON</strong>.
+ <?php printf(gettext('%sDefault%s is %sON%s.'), '<strong>', '</strong>', '<strong>', '</strong>'); ?>
<input name="alertnumber" type="text" class="formfld" id="alertnumber" size="5" value="<?=htmlspecialchars($anentries);?>">
- Enter the number of log entries to view. <strong>Default</strong> is <strong>250</strong>.
+ <?php printf(gettext('Enter the number of log entries to view. %sDefault%s is %s250%s.'), '<strong>', '</strong>', '<strong>', '</strong>'); ?>
</td>
</tr>
<tr>
@@ -242,16 +242,16 @@ if ($pconfig['arefresh'] == 'on')
<td width="100%" colspan="2" class='vtable'>
<table id="myTable" width="100%" class="sortable" border="1" cellpadding="0" cellspacing="0">
<thead>
- <th class='listhdr' width='10%' axis="date">Date</th>
- <th class='listhdrr' width='5%' axis="number">PRI</th>
- <th class='listhdrr' width='3%' axis="string">PROTO</th>
- <th class='listhdrr' width='7%' axis="string">CLASS</th>
- <th class='listhdrr' width='15%' axis="string">SRC</th>
- <th class='listhdrr' width='5%' axis="string">SRCPORT</th>
- <th class='listhdrr' width='15%' axis="string">DST</th>
- <th class='listhdrr' width='5%' axis="string">DSTPORT</th>
- <th class='listhdrr' width='5%' axis="string">SID</th>
- <th class='listhdrr' width='20%' axis="string">DESCRIPTION</th>
+ <th class='listhdr' width='10%' axis="date"><?php echo gettext("Date"); ?></th>
+ <th class='listhdrr' width='5%' axis="number"><?php echo gettext("PRI"); ?></th>
+ <th class='listhdrr' width='3%' axis="string"><?php echo gettext("PROTO"); ?></th>
+ <th class='listhdrr' width='7%' axis="string"><?php echo gettext("CLASS"); ?></th>
+ <th class='listhdrr' width='15%' axis="string"><?php echo gettext("SRC"); ?></th>
+ <th class='listhdrr' width='5%' axis="string"><?php echo gettext("SRCPORT"); ?></th>
+ <th class='listhdrr' width='15%' axis="string"><?php echo gettext("DST"); ?></th>
+ <th class='listhdrr' width='5%' axis="string"><?php echo gettext("DSTPORT"); ?></th>
+ <th class='listhdrr' width='5%' axis="string"><?php echo gettext("SID"); ?></th>
+ <th class='listhdrr' width='20%' axis="string"><?php echo gettext("DESCRIPTION"); ?></th>
</thead>
<tbody>
<?php
@@ -265,10 +265,9 @@ if (file_exists("/var/log/snort/snort_{$if_real}{$snort_uuid}/alert")) {
/* 0 1 2 3 4 5 6 7 8 9 10 11 12 */
/* File format timestamp,sig_generator,sig_id,sig_rev,msg,proto,src,srcport,dst,dstport,id,classification,priority */
$fd = fopen("/tmp/alert_{$snort_uuid}", "r");
- while(($fileline = @fgets($fd))) {
- if (empty($fileline))
+ while (($fields = fgetcsv($fd, 1000, ',', '"')) !== FALSE) {
+ if(count($fields) < 11)
continue;
- $fields = explode(",", $fileline);
/* Date */
$alert_date = substr($fields[0], 0, -8);
@@ -283,7 +282,7 @@ if (file_exists("/var/log/snort/snort_{$if_real}{$snort_uuid}/alert")) {
$alert_ip_src = $fields[6];
if (isset($tmpblocked[$fields[6]])) {
$alert_ip_src .= "<a href='?instance={$id}&todelete=" . trim(urlencode($fields[6])) . "'>
- <img title=\"Remove from blocked ips\" border=\"0\" width='10' height='10' name='todelete' id='todelete' alt=\"Delete\" src=\"../themes/{$g['theme']}/images/icons/icon_x.gif\"></a>";
+ <img title=\"" . gettext("Remove from blocked ips") . "\" border=\"0\" width='10' height='10' name='todelete' id='todelete' alt=\"Delete\" src=\"../themes/{$g['theme']}/images/icons/icon_x.gif\"></a>";
}
/* IP SRC Port */
$alert_src_p = $fields[7];
@@ -291,7 +290,7 @@ if (file_exists("/var/log/snort/snort_{$if_real}{$snort_uuid}/alert")) {
$alert_ip_dst = $fields[8];
if (isset($tmpblocked[$fields[8]])) {
$alert_ip_dst .= "<a href='?instance={$id}&todelete=" . trim(urlencode($fields[8])) . "'>
- <img title=\"Remove from blocked ips\" border=\"0\" width='10' height='10' name='todelete' id='todelete' alt=\"Delete\" src=\"../themes/{$g['theme']}/images/icons/icon_x.gif\"></a>";
+ <img title=\"" . gettext("Remove from blocked ips") . "\" border=\"0\" width='10' height='10' name='todelete' id='todelete' alt=\"Delete\" src=\"../themes/{$g['theme']}/images/icons/icon_x.gif\"></a>";
}
/* IP DST Port */
$alert_dst_p = $fields[9];
@@ -311,9 +310,9 @@ if (file_exists("/var/log/snort/snort_{$if_real}{$snort_uuid}/alert")) {
<td class='listr' width='5%' >
{$alert_sid_str}
<a href='?instance={$instanceid}&act=addsuppress&sidid={$fields[2]}&gen_id={$fields[1]}&descr={$alert_descr_url}'>
- <img src='../themes/{$g['theme']}/images/icons/icon_plus.gif'
+ <img src='../themes/{$g['theme']}/images/icons/icon_plus.gif'
width='10' height='10' border='0'
- title='click to add to suppress list'></a>
+ title='" . gettext("click to add to suppress list") . "'></a>
</td>
<td class='listr' width='20%'>{$alert_descr}</td>
</tr>\n";
diff --git a/config/snort/snort_barnyard.php b/config/snort/snort_barnyard.php
index 71d355f9..ccbe3c26 100644
--- a/config/snort/snort_barnyard.php
+++ b/config/snort/snort_barnyard.php
@@ -162,40 +162,40 @@ function enable_change(enable_change) {
<td class="tabcont">
<table width="100%" border="0" cellpadding="6" cellspacing="0">
<tr>
- <td colspan="2" valign="top" class="listtopic">General Barnyard2
- Settings</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("General Barnyard2 " .
+ "Settings"); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncellreq">Enable</td>
+ <td width="22%" valign="top" class="vncellreq"><?php echo gettext("Enable"); ?></td>
<td width="78%" class="vtable">
<input name="barnyard_enable" type="checkbox" value="on" <?php if ($pconfig['barnyard_enable'] == "on") echo "checked"; ?> onClick="enable_change(false)">
- <strong>Enable Barnyard2 </strong><br>
- This will enable barnyard2 for this interface. You will also have to set the database credentials.</td>
+ <strong><?php echo gettext("Enable Barnyard2"); ?></strong><br>
+ <?php echo gettext("This will enable barnyard2 for this interface. You will also have to set the database credentials."); ?></td>
</tr>
<tr>
- <td colspan="2" valign="top" class="listtopic">Mysql Settings</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("Mysql Settings"); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Log to a Mysql Database</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Log to a Mysql Database"); ?></td>
<td width="78%" class="vtable"><input name="barnyard_mysql"
type="text" class="formfld" id="barnyard_mysql" size="100"
value="<?=htmlspecialchars($pconfig['barnyard_mysql']);?>"> <br>
- <span class="vexpl">Example: output database: alert, mysql,
- dbname=snort user=snort host=localhost password=xyz<br>
- Example: output database: log, mysql, dbname=snort user=snort
- host=localhost password=xyz</span></td>
+ <span class="vexpl"><?php echo gettext("Example: output database: alert, mysql, " .
+ "dbname=snort user=snort host=localhost password=xyz"); ?><br>
+ <?php echo gettext("Example: output database: log, mysql, dbname=snort user=snort " .
+ "host=localhost password=xyz"); ?></span></td>
</tr>
<tr>
- <td colspan="2" valign="top" class="listtopic">Advanced Settings</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("Advanced Settings"); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Advanced configuration
- pass through</td>
+ <td width="22%" valign="top" class="vncell"<?php echo gettext("Advanced configuration " .
+ "pass through"); ?></td>
<td width="78%" class="vtable"><textarea name="barnconfigpassthru"
cols="60" rows="7" id="barnconfigpassthru" ><?=htmlspecialchars($pconfig['barnconfigpassthru']);?></textarea>
<br>
- Arguments here will be automatically inserted into the running
- barnyard2 configuration.</td>
+ <?php echo gettext("Arguments here will be automatically inserted into the running " .
+ "barnyard2 configuration."); ?></td>
</tr>
<tr>
<td width="22%" valign="top">&nbsp;</td>
@@ -205,9 +205,9 @@ function enable_change(enable_change) {
</tr>
<tr>
<td width="22%" valign="top">&nbsp;</td>
- <td width="78%"><span class="vexpl"><span class="red"><strong>Note:</strong></span>
+ <td width="78%"><span class="vexpl"><span class="red"><strong><?php echo gettext("Note:"); ?></strong></span>
<br>
- Please save your settings befor you click start. </td>
+ <?php echo gettext("Please save your settings befor you click start."); ?> </td>
</tr>
</table>
diff --git a/config/snort/snort_blocked.php b/config/snort/snort_blocked.php
index babb6bea..def5dd22 100644
--- a/config/snort/snort_blocked.php
+++ b/config/snort/snort_blocked.php
@@ -137,15 +137,15 @@ if ($pconfig['brefresh'] == 'on')
<table width="99%" border="0" cellpadding="0" cellspacing="0">
<tr><td>
<?php
- $tab_array = array();
- $tab_array[0] = array(gettext("Snort Interfaces"), false, "/snort/snort_interfaces.php");
- $tab_array[1] = array(gettext("Global Settings"), false, "/snort/snort_interfaces_global.php");
- $tab_array[2] = array(gettext("Updates"), false, "/snort/snort_download_updates.php");
- $tab_array[3] = array(gettext("Alerts"), false, "/snort/snort_alerts.php");
- $tab_array[4] = array(gettext("Blocked"), true, "/snort/snort_blocked.php");
- $tab_array[5] = array(gettext("Whitelists"), false, "/snort/snort_interfaces_whitelist.php");
- $tab_array[6] = array(gettext("Suppress"), false, "/snort/snort_interfaces_suppress.php");
- display_top_tabs($tab_array);
+ $tab_array = array();
+ $tab_array[0] = array(gettext("Snort Interfaces"), false, "/snort/snort_interfaces.php");
+ $tab_array[1] = array(gettext("Global Settings"), false, "/snort/snort_interfaces_global.php");
+ $tab_array[2] = array(gettext("Updates"), false, "/snort/snort_download_updates.php");
+ $tab_array[3] = array(gettext("Alerts"), false, "/snort/snort_alerts.php");
+ $tab_array[4] = array(gettext("Blocked"), true, "/snort/snort_blocked.php");
+ $tab_array[5] = array(gettext("Whitelists"), false, "/snort/snort_interfaces_whitelist.php");
+ $tab_array[6] = array(gettext("Suppress"), false, "/snort/snort_interfaces_suppress.php");
+ display_top_tabs($tab_array);
?>
</td></tr>
<tr>
@@ -153,30 +153,30 @@ if ($pconfig['brefresh'] == 'on')
<table id="maintable" class="tabcont" width="100%" border="0"
cellpadding="0" cellspacing="0">
<tr>
- <td width="22%" colspan="0" class="listtopic">Last <?=$bnentries;?>
- Blocked.</td>
- <td width="78%" class="listtopic">This page lists hosts that have
- been blocked by Snort.&nbsp;&nbsp;<?=$blocked_msg_txt;?></td>
+ <td width="22%" colspan="0" class="listtopic"><?php printf(gettext("Last %s " .
+ "Blocked."), $bnentries); ?></td>
+ <td width="78%" class="listtopic"><?php echo gettext("This page lists hosts that have " .
+ "been blocked by Snort."); ?>&nbsp;&nbsp;<?=$blocked_msg_txt;?></td>
</tr>
<tr>
- <td width="22%" class="vncell">Save or Remove Hosts</td>
+ <td width="22%" class="vncell"><?php echo gettext("Save or Remove Hosts"); ?></td>
<td width="78%" class="vtable">
- <input name="download" type="submit" class="formbtn" value="Download"> All
- blocked hosts will be saved. <input name="remove" type="submit"
- class="formbtn" value="Clear"> <span class="red"><strong>Warning:</strong></span>
- all hosts will be removed.</form>
+ <input name="download" type="submit" class="formbtn" value="Download"> <?php echo gettext("All " .
+ "blocked hosts will be saved."); ?> <input name="remove" type="submit"
+ class="formbtn" value="Clear"> <span class="red"><strong><?php echo gettext("Warning:"); ?></strong></span>
+ <?php echo gettext("all hosts will be removed."); ?></form>
</td>
</tr>
<tr>
- <td width="22%" class="vncell">Auto Refresh and Log View</td>
+ <td width="22%" class="vncell"><?php echo gettext("Auto Refresh and Log View"); ?></td>
<td width="78%" class="vtable">
- <input name="save" type="submit" class="formbtn" value="Save"> Refresh <input
+ <input name="save" type="submit" class="formbtn" value="Save"> <?php echo gettext("Refresh"); ?> <input
name="brefresh" type="checkbox" value="on"
<?php if ($config['installedpackages']['snortglobal']['alertsblocks']['brefresh']=="on" || $config['installedpackages']['snortglobal']['alertsblocks']['brefresh']=='') echo "checked"; ?>>
- <strong>Default</strong> is <strong>ON</strong>. <input
+ <?php printf(gettext("%sDefault%s is %sON%s."), '<strong>', '</strong>', '<strong>', '</strong>'); ?> <input
name="blertnumber" type="text" class="formfld" id="blertnumber"
- size="5" value="<?=htmlspecialchars($bnentries);?>"> Enter the
- number of blocked entries to view. <strong>Default</strong> is <strong>500</strong>.
+ size="5" value="<?=htmlspecialchars($bnentries);?>"> <?php printf(gettext("Enter the " .
+ "number of blocked entries to view. %sDefault%s is %s500%s."), '<strong>', '</strong>', '<strong>', '</strong>'); ?>
</td>
</tr>
<tr>
@@ -185,9 +185,9 @@ if ($pconfig['brefresh'] == 'on')
cellpadding="0" cellspacing="0">
<tr id="frheader">
<td width="5%" class="listhdrr">#</td>
- <td width="15%" class="listhdrr">IP</td>
- <td width="70%" class="listhdrr">Alert Description</td>
- <td width="5%" class="listhdrr">Remove</td>
+ <td width="15%" class="listhdrr"><?php echo gettext("IP"); ?></td>
+ <td width="70%" class="listhdrr"><?php echo gettext("Alert Description"); ?></td>
+ <td width="5%" class="listhdrr"><?php echo gettext("Remove"); ?></td>
</tr>
<?php
/* set the arrays */
@@ -208,10 +208,9 @@ if ($pconfig['brefresh'] == 'on')
if ($fd) {
/* 0 1 2 3 4 5 6 7 8 9 10 11 12
/* File format timestamp,sig_generator,sig_id,sig_rev,msg,proto,src,srcport,dst,dstport,id,classification,priority */
- while(($fileline = @fgets($fd))) {
- if (empty($fileline))
+ while (($fields = fgetcsv($fd, 1000, ',', '"')) !== FALSE) {
+ if(count($fields) < 11)
continue;
- $fields = explode(",", $fileline);
if (isset($tmpblocked[$fields[6]])) {
if (!is_array($src_ip_list[$fields[6]]))
@@ -248,7 +247,7 @@ if ($pconfig['brefresh'] == 'on')
<td width='15%' >&nbsp;{$blocked_ip}</td>
<td width='70%' >&nbsp;{$blocked_desc}</td>
<td width='5%' align=\"center\" valign=\"top\"'><a href='snort_blocked.php?todelete=" . trim(urlencode($blocked_ip)) . "'>
- <img title=\"Delete\" border=\"0\" name='todelete' id='todelete' alt=\"Delete\" src=\"../themes/{$g['theme']}/images/icons/icon_x.gif\"></a></td>
+ <img title=\"" . gettext("Delete") . "\" border=\"0\" name='todelete' id='todelete' alt=\"Delete\" src=\"../themes/{$g['theme']}/images/icons/icon_x.gif\"></a></td>
</tr>\n";
}
diff --git a/config/snort/snort_check_for_rule_updates.php b/config/snort/snort_check_for_rule_updates.php
index 5b357cb7..689b3174 100644
--- a/config/snort/snort_check_for_rule_updates.php
+++ b/config/snort/snort_check_for_rule_updates.php
@@ -78,7 +78,7 @@ if ($snortdownload == 'on') {
@file_put_contents("{$tmpfname}/{$snort_filename_md5}", $image);
if (0 == filesize("{$tmpfname}/{$snort_filename_md5}")) {
update_status(gettext("Please wait... You may only check for New Rules every 15 minutes..."));
- log_error(gettext("Please wait... You may only check for New Rules every 15 minutes..."));
+ log_error("Please wait... You may only check for New Rules every 15 minutes...");
update_output_window(gettext("Rules are released every month from snort.org. You may download the Rules at any time."));
$snortdownload = 'off';
} else
@@ -101,12 +101,12 @@ if ($snortdownload == 'on') {
/* download snortrules file */
if ($snortdownload == 'on') {
update_status(gettext("There is a new set of Snort.org rules posted. Downloading..."));
- log_error(gettext("There is a new set of Snort.org rules posted. Downloading..."));
+ log_error("There is a new set of Snort.org rules posted. Downloading...");
download_file_with_progress_bar("http://www.snort.org/pub-bin/oinkmaster.cgi/{$oinkid}/{$snort_filename}", "{$tmpfname}/{$snort_filename}");
update_status(gettext("Done downloading rules file."));
if (300000 > filesize("{$tmpfname}/$snort_filename")){
update_output_window(gettext("Snort rules file downloaded failed..."));
- log_error(gettext("Snort rules file downloaded failed..."));
+ log_error("Snort rules file downloaded failed...");
$snortdownload = 'off';
}
}
@@ -125,7 +125,7 @@ if ($emergingthreats == 'on') {
$emerg_md5_check_old = file_get_contents("{$snortdir}/{$emergingthreats_filename_md5}");
if ($emerg_md5_check_new == $emerg_md5_check_old) {
update_status(gettext("Emerging threat rules are up to date..."));
- log_error(gettext("Emerging threat rules are up to date..."));
+ log_error("Emerging threat rules are up to date...");
$emergingthreats = 'off';
}
}
@@ -134,7 +134,7 @@ if ($emergingthreats == 'on') {
/* download emergingthreats rules file */
if ($emergingthreats == "on") {
update_status(gettext("There is a new set of Emergingthreats rules posted. Downloading..."));
- log_error(gettext("There is a new set of Emergingthreats rules posted. Downloading..."));
+ log_error("There is a new set of Emergingthreats rules posted. Downloading...");
download_file_with_progress_bar("http://rules.emergingthreats.net/open/snort-{$emerging_threats_version}/emerging.rules.tar.gz", "{$tmpfname}/{$emergingthreats_filename}");
update_status(gettext('Done downloading Emergingthreats rules file.'));
log_error("Emergingthreats rules file update downloaded succsesfully");
@@ -300,7 +300,7 @@ function snort_apply_customizations($snortcfg, $if_real) {
return;
else {
update_status(gettext("Your set of configured rules are being copied..."));
- log_error(gettext("Your set of configured rules are being copied..."));
+ log_error("Your set of configured rules are being copied...");
$enabled_rulesets_array = explode("||", $snortcfg['rulesets']);
foreach($enabled_rulesets_array as $enabled_item) {
@copy("{$snortdir}/rules/{$enabled_item}", "{$snortdir}/snort_{$snortcfg['uuid']}_{$if_real}/rules/{$enabled_item}");
@@ -398,9 +398,9 @@ if ($snortdownload == 'on' || $emergingthreats == 'on') {
if (is_process_running("snort")) {
exec("/bin/sh /usr/local/etc/rc.d/snort.sh restart");
update_output_window(gettext("Snort has restarted with your new set of rules..."));
- log_error(gettext("Snort has restarted with your new set of rules..."));
+ log_error("Snort has restarted with your new set of rules...");
} else
- log_error(gettext("Snort Rules update finished..."));
+ log_error("Snort Rules update finished...");
}
update_status(gettext("The Rules update finished..."));
diff --git a/config/snort/snort_define_servers.php b/config/snort/snort_define_servers.php
index c5328c21..20917d00 100644
--- a/config/snort/snort_define_servers.php
+++ b/config/snort/snort_define_servers.php
@@ -177,7 +177,7 @@ if ($savemsg)
<td class="tabcont">
<table width="100%" border="0" cellpadding="6" cellspacing="0">
<tr>
- <td colspan="2" valign="top" class="listtopic">Define Servers</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("Define Servers"); ?></td>
</tr>
<?php
foreach ($snort_servers as $key => $server):
@@ -189,18 +189,18 @@ if ($savemsg)
$value = htmlspecialchars($pconfig["def_{$key}"]);
?>
<tr>
- <td width='22%' valign='top' class='vncell'>Define <?=$label;?></td>
+ <td width='22%' valign='top' class='vncell'><?php echo gettext("Define"); ?> <?=$label;?></td>
<td width="78%" class="vtable">
<input name="def_<?=$key;?>" size="40"
type="text" autocomplete="off" class="formfldalias" id="def_<?=$key;?>"
value="<?=$value;?>"> <br/>
- <span class="vexpl">Default value: "<?=$server;?>" <br/>Leave
- blank for default value.</span>
+ <span class="vexpl"><?php echo gettext("Default value:"); ?> "<?=$server;?>" <br/><?php echo gettext("Leave " .
+ "blank for default value."); ?></span>
</td>
</tr>
<?php endforeach; ?>
<tr>
- <td colspan="2" valign="top" class="listtopic">Define Ports</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("Define Ports"); ?></td>
</tr>
<?php
foreach ($snort_ports as $key => $server):
@@ -211,12 +211,12 @@ if ($savemsg)
$value = htmlspecialchars($pconfig["def_{$key}"]);
?>
<tr>
- <td width='22%' valign='top' class='vncell'>Define <?=$label;?></td>
+ <td width='22%' valign='top' class='vncell'><?php echo gettext("Define"); ?> <?=$label;?></td>
<td width="78%" class="vtable">
<input name="def_<?=$key;?>" type="text" size="40" autocomplete="off" class="formfldalias" id="def_<?=$key;?>"
value="<?=$value;?>"> <br/>
- <span class="vexpl">Default value: "<?=$server;?>" <br/> Leave
- blank for default value.</span>
+ <span class="vexpl"><?php echo gettext("Default value:"); ?> "<?=$server;?>" <br/> <?php echo gettext("Leave " .
+ "blank for default value."); ?></span>
</td>
</tr>
<?php endforeach; ?>
diff --git a/config/snort/snort_download_updates.php b/config/snort/snort_download_updates.php
index 90943a30..4c4202a8 100644
--- a/config/snort/snort_download_updates.php
+++ b/config/snort/snort_download_updates.php
@@ -98,7 +98,7 @@ include_once("head.inc");
<font color="#777777" size="1.5px">
<p style="text-align: left; margin-left: 225px;">
- <b>INSTALLED SIGNATURE RULESET</b></font><br>
+ <b><?php echo gettext("INSTALLED SIGNATURE RULESET"); ?></b></font><br>
<br>
<font color="#FF850A" size="1px"><b>SNORT.ORG >>></b></font>
<font size="1px" color="#000000">&nbsp;&nbsp;<? echo $snort_org_sig_chk_local; ?></font><br>
@@ -117,22 +117,22 @@ include_once("head.inc");
<div height="32" width="725px" style='background-color: #eeeeee'>
<p style="text-align: left; margin-left: 225px;">
- <font color='#777777' size='1.5px'><b>UPDATE YOUR RULES</b></font><br>
+ <font color='#777777' size='1.5px'><b><?php echo gettext("UPDATE YOUR RULES"); ?></b></font><br>
<br/>
<?php
if ($snortdownload != 'on' && $emergingthreats != 'on') {
echo '
- <button disabled="disabled"><span class="download">Update Rules&nbsp;&nbsp;&nbsp;&nbsp;</span></button><br/>
+ <button disabled="disabled"><span class="download">' . gettext("Update Rules") . '&nbsp;&nbsp;&nbsp;&nbsp;</span></button><br/>
<p style="text-align:left; margin-left:150px;">
- <font color="#fc3608" size="2px"><b>WARNING:</b></font><font size="1px" color="#000000">&nbsp;&nbsp;No rule types have been selected for download. "Global Settings Tab"</font><br>';
+ <font color="#fc3608" size="2px"><b>' . gettext("WARNING:") . '</b></font><font size="1px" color="#000000">&nbsp;&nbsp;' . gettext('No rule types have been selected for download. "Global Settings Tab"') . '</font><br>';
echo '</p>' . "\n";
} else {
echo '
- <a href="/snort/snort_download_rules.php"><button ><span class="download">Update Rules&nbsp;&nbsp;&nbsp;&nbsp;</span></button></a><br/>' . "\n";
+ <a href="/snort/snort_download_rules.php"><button ><span class="download">' . gettext("Update Rules") . '&nbsp;&nbsp;&nbsp;&nbsp;</span></button></a><br/>' . "\n";
}
@@ -150,17 +150,17 @@ include_once("head.inc");
<div height="32" width="725px" style='background-color: #eeeeee'>
<p style="text-align: left; margin-left: 225px;">
- <font color='#777777' size='1.5px'><b>VIEW UPDATE LOG</b></font><br>
+ <font color='#777777' size='1.5px'><b><?php echo gettext("VIEW UPDATE LOG"); ?></b></font><br>
<br>
<?php
if ($update_logfile_chk == 'yes') {
echo "
- <button href='/snort/snort_rules_edit.php?openruleset={$snortdir}/snort_update.log'><span class='pwhitetxt'>Update Log&nbsp;&nbsp;&nbsp;&nbsp;</span></button>\n";
+ <button href='/snort/snort_rules_edit.php?openruleset={$snortdir}/snort_update.log'><span class='pwhitetxt'>" . gettext("Update Log") . "&nbsp;&nbsp;&nbsp;&nbsp;</span></button>\n";
}else{
echo "
- <button disabled='disabled' href='/snort/snort_rules_edit.php?openruleset={$snortdir}/snort_update.log'><span class='pwhitetxt'>Update Log&nbsp;&nbsp;&nbsp;&nbsp;</span></button>\n";
+ <button disabled='disabled' href='/snort/snort_rules_edit.php?openruleset={$snortdir}/snort_update.log'><span class='pwhitetxt'>" . gettext("Update Log") . "&nbsp;&nbsp;&nbsp;&nbsp;</span></button>\n";
}
?>
@@ -178,9 +178,9 @@ include_once("head.inc");
<tr>
<td id="download_rules_td" style='background-color: #eeeeee'>
<div height="32" width="725px" style='background-color: #eeeeee'>
- <font color='#FF850A' size='1px'><b>NOTE:</b></font><font size='1px'
- color='#000000'>&nbsp;&nbsp;Snort.org and Emergingthreats.net
- will go down from time to time. Please be patient.
+ <font color='#FF850A' size='1px'><b><?php echo gettext("NOTE:"); ?></b></font><font size='1px'
+ color='#000000'>&nbsp;&nbsp;<?php echo gettext("Snort.org and Emergingthreats.net " .
+ "will go down from time to time. Please be patient."); ?>
</font>
</div>
</td>
diff --git a/config/snort/snort_interfaces.php b/config/snort/snort_interfaces.php
index 67a7257d..1e155e82 100644
--- a/config/snort/snort_interfaces.php
+++ b/config/snort/snort_interfaces.php
@@ -165,10 +165,10 @@ if ($pfsense_stable == 'yes')
if($savemsg)
print_info_box_np("{$savemsg}");
else {
- print_info_box_np('
- The Snort configuration has changed for one or more interfaces.<br>
- You must apply the changes in order for them to take effect.<br>
- ');
+ print_info_box_np(gettext(
+ 'The Snort configuration has changed for one or more interfaces.<br>' .
+ 'You must apply the changes in order for them to take effect.<br>'
+ ));
}
}
?>
@@ -194,12 +194,12 @@ if ($pfsense_stable == 'yes')
cellspacing="0">
<tr id="frheader">
<td width="5%" class="list">&nbsp;</td>
- <td width="10%" class="listhdrr">If</td>
- <td width="13%" class="listhdrr">Snort</td>
- <td width="10%" class="listhdrr">Performance</td>
- <td width="10%" class="listhdrr">Block</td>
- <td width="12%" class="listhdrr">Barnyard2</td>
- <td width="30%" class="listhdr">Description</td>
+ <td width="10%" class="listhdrr"><?php echo gettext("If"); ?></td>
+ <td width="13%" class="listhdrr"><?php echo gettext("Snort"); ?></td>
+ <td width="10%" class="listhdrr"><?php echo gettext("Performance"); ?></td>
+ <td width="10%" class="listhdrr"><?php echo gettext("Block"); ?></td>
+ <td width="12%" class="listhdrr"><?php echo gettext("Barnyard2"); ?></td>
+ <td width="30%" class="listhdr"><?php echo gettext("Description"); ?></td>
<td width="3%" class="list">
<table border="0" cellspacing="0" cellpadding="1">
<tr>
@@ -248,7 +248,7 @@ if ($pfsense_stable == 'yes')
echo "<a href='?act=toggle&id={$i}'>
<img src='../themes/{$g['theme']}/images/icons/icon_{$iconfn}.gif'
width='13' height='13' border='0'
- title='click to toggle start/stop snort'></a>";
+ title='" . gettext('click to toggle start/stop snort') . "'></a>";
} else
echo strtoupper("disabled");
?>
@@ -286,7 +286,7 @@ if ($pfsense_stable == 'yes')
echo "<a href='?act=bartoggle&id={$i}'>
<img src='../themes/{$g['theme']}/images/icons/icon_{$biconfn}.gif'
width='13' height='13' border='0'
- title='click to toggle start/stop barnyard'></a>";
+ title='" . gettext('click to toggle start/stop barnyard') . "'></a>";
} else
echo strtoupper("disabled");
?>
@@ -300,7 +300,7 @@ if ($pfsense_stable == 'yes')
<tr>
<td><a href="snort_interfaces_edit.php?id=<?=$i;?>"><img
src="/themes/<?= $g['theme']; ?>/images/icons/icon_e.gif"
- width="17" height="17" border="0" title="edit rule"></a></td>
+ width="17" height="17" border="0" title="<?php echo gettext('edit rule'); ?>"></a></td>
</tr>
</table>
@@ -313,10 +313,10 @@ if ($pfsense_stable == 'yes')
<tr>
<td><?php if ($nnats == 0): ?><img
src="../themes/<?= $g['theme']; ?>/images/icons/icon_x_d.gif"
- width="17" height="17" title="delete selected rules" border="0"><?php else: ?><input
+ width="17" height="17" title="<?php echo gettext("delete selected rules"); ?>" border="0"><?php else: ?><input
name="del" type="image"
src="../themes/<?= $g['theme']; ?>/images/icons/icon_x.gif"
- width="17" height="17" title="delete selected mappings"
+ width="17" height="17" title="<?php echo gettext("delete selected mappings"); ?>"
onclick="return confirm('Do you really want to delete the selected Snort Rule?')"><?php endif; ?></td>
</tr>
</table>
@@ -336,35 +336,35 @@ if ($pfsense_stable == 'yes')
<table class="tabcont" width="100%" border="0" cellpadding="0"
cellspacing="0">
<tr id="frheader">
- <td width="100%"><span class="red"><strong>Note:</strong></span> <br>
- This is the <strong>Snort Menu</strong> where you can see an over
- view of all your interface settings. <br>
- Please edit the <strong>Global Settings</strong> tab before adding
- an interface. <br>
+ <td width="100%"><span class="red"><strong><?php echo gettext("Note:"); ?></strong></span> <br>
+ <?php echo gettext('This is the <strong>Snort Menu</strong> where you can see an over ' .
+ 'view of all your interface settings. <br> ' .
+ 'Please edit the <strong>Global Settings</strong> tab before adding ' .
+ 'an interface.'); ?> <br>
<br>
- <span class="red"><strong>Warning:</strong></span> <br>
- <strong>New settings will not take effect until interface restart.</strong>
+ <span class="red"><strong><?php echo gettext("Warning:"); ?></strong></span> <br>
+ <strong><?php echo gettext("New settings will not take effect until interface restart."); ?></strong>
<br>
<br>
<strong>Click</strong> on the <img
src="../themes/<?= $g['theme']; ?>/images/icons/icon_plus.gif"
- width="17" height="17" border="0" title="Add Icon"> icon to add a
+ width="17" height="17" border="0" title="<?php echo gettext("Add Icon"); ?>"> icon to add a
interface.<strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Click</strong>
on the <img
src="../themes/<?= $g['theme']; ?>/images/icons/icon_pass.gif"
- width="13" height="13" border="0" title="Start Icon"> icon to <strong>start</strong>
+ width="13" height="13" border="0" title="<?php echo gettext("Start Icon"); ?>"> icon to <strong>start</strong>
snort and barnyard2. <br>
<strong>Click</strong> on the <img
src="../themes/<?= $g['theme']; ?>/images/icons/icon_e.gif"
- width="17" height="17" border="0" title="Edit Icon"> icon to edit a
+ width="17" height="17" border="0" title="<?php echo gettext("Edit Icon"); ?>"> icon to edit a
interface and settings.<strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Click</strong>
on the <img
src="../themes/<?= $g['theme']; ?>/images/icons/icon_block.gif"
- width="13" height="13" border="0" title="Stop Icon"> icon to <strong>stop</strong>
+ width="13" height="13" border="0" title="<?php echo gettext("Stop Icon"); ?>"> icon to <strong>stop</strong>
snort and barnyard2. <br>
<strong> Click</strong> on the <img
src="../themes/<?= $g['theme']; ?>/images/icons/icon_x.gif"
- width="17" height="17" border="0" title="Delete Icon"> icon to
+ width="17" height="17" border="0" title="<?php echo gettext("Delete Icon"); ?>"> icon to
delete a interface and settings.</td>
</tr>
</table>
diff --git a/config/snort/snort_interfaces_edit.php b/config/snort/snort_interfaces_edit.php
index 1c7f9cfb..f47a055e 100644
--- a/config/snort/snort_interfaces_edit.php
+++ b/config/snort/snort_interfaces_edit.php
@@ -197,23 +197,23 @@ function enable_change(enable_change) {
<tr><td class="tabcont">
<table width="100%" border="0" cellpadding="6" cellspacing="0">
<tr>
- <td colspan="2" valign="top" class="listtopic">General Settings</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("General Settings"); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncellreq">Enable</td>
+ <td width="22%" valign="top" class="vncellreq"><?php echo gettext("Enable"); ?></td>
<td width="78%" valign="top" class="vtable">&nbsp;
<?php
if ($pconfig['enable'] == "on")
$checked = "checked";
echo "
<input name=\"enable\" type=\"checkbox\" value=\"on\" $checked onClick=\"enable_change(false)\">
- &nbsp;&nbsp;Enable or Disable\n";
+ &nbsp;&nbsp;" . gettext("Enable or Disable") . "\n";
?>
<br/>
</td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncellreq">Interface</td>
+ <td width="22%" valign="top" class="vncellreq"><?php echo gettext("Interface"); ?></td>
<td width="78%" class="vtable">
<select name="interface" class="formselect">
<?php
@@ -231,19 +231,19 @@ function enable_change(enable_change) {
</option>
<?php endforeach; ?>
</select><br>
- <span class="vexpl">Choose which interface this rule applies to.<br/>
- <b>Hint: </b>in most cases, you'll want to use WAN here.</span><br/><br/></td>
+ <span class="vexpl"><?php echo gettext("Choose which interface this rule applies to."); ?><br/>
+ <b><?php echo gettext("Hint:"); ?> </b><?php echo gettext("in most cases, you'll want to use WAN here."); ?></span><br/><br/></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncellreq">Description</td>
+ <td width="22%" valign="top" class="vncellreq"><?php echo gettext("Description"); ?></td>
<td width="78%" class="vtable"><input name="descr" type="text"
class="formfld" id="descr" size="40"
value="<?=htmlspecialchars($pconfig['descr']);?>"> <br/>
- <span class="vexpl">You may enter a description here for your
- reference (not parsed).</span><br/><br/></td>
+ <span class="vexpl"><?php echo gettext("You may enter a description here for your " .
+ "reference (not parsed)."); ?></span><br/><br/></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Memory Performance</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Memory Performance"); ?></td>
<td width="78%" class="vtable">
<select name="performance" class="formselect" id="performance">
<?php
@@ -254,19 +254,19 @@ function enable_change(enable_change) {
<?=htmlspecialchars($ifacename2);?></option>
<?php endforeach; ?>
</select><br>
- <span class="vexpl">Lowmem and ac-bnfa are recommended for low end
- systems, Ac: high memory, best performance, ac-std: moderate
- memory,high performance, acs: small memory, moderateperformance,
- ac-banded: small memory,moderate performance, ac-sparsebands: small
- memory, high performance.
+ <span class="vexpl"><?php echo gettext("Lowmem and ac-bnfa are recommended for low end " .
+ "systems, Ac: high memory, best performance, ac-std: moderate " .
+ "memory,high performance, acs: small memory, moderateperformance, " .
+ "ac-banded: small memory,moderate performance, ac-sparsebands: small " .
+ "memory, high performance."); ?>
</span><br/></td>
</tr>
<tr>
- <td colspan="2" valign="top" class="listtopic">Choose the networks
- snort should inspect and whitelist.</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("Choose the networks " .
+ "snort should inspect and whitelist."); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Home net</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Home net"); ?></td>
<td width="78%" class="vtable">
<select name="homelistname" class="formselect" id="homelistname">
<?php
@@ -284,14 +284,14 @@ function enable_change(enable_change) {
}
?>
</select><br/>
- <span class="vexpl">Choose the home net you will like this rule to
- use. </span><br/>&nbsp;<br/><span class="red">Note:</span>&nbsp;Default home
- net adds only local networks.<br>
- <span class="red">Hint:</span>&nbsp;Most users add a list of
- friendly ips that the firewall cant see.<br/></td>
+ <span class="vexpl"><?php echo gettext("Choose the home net you will like this rule to " .
+ "use."); ?> </span><br/>&nbsp;<br/><span class="red"><?php echo gettext("Note:"); ?></span>&nbsp;<?php echo gettext("Default home " .
+ "net adds only local networks."); ?><br>
+ <span class="red"><?php echo gettext("Hint:"); ?></span>&nbsp;<?php echo gettext("Most users add a list of " .
+ "friendly ips that the firewall cant see."); ?><br/></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">External net</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("External net"); ?></td>
<td width="78%" class="vtable">
<select name="externallistname" class="formselect" id="externallistname">
<?php
@@ -309,30 +309,30 @@ function enable_change(enable_change) {
}
?>
</select><br/>
- <span class="vexpl">Choose the external net you will like this rule
- to use. </span>&nbsp;<br/><span class="red">Note:</span>&nbsp;Default
- external net, networks that are not home net.<br/>
- <span class="red">Hint:</span>&nbsp;Most users should leave this
- setting at default.<br/></td>
+ <span class="vexpl"><?php echo gettext("Choose the external net you will like this rule " .
+ "to use."); ?> </span>&nbsp;<br/><span class="red"><?php echo gettext("Note:"); ?></span>&nbsp;<?php echo gettext("Default " .
+ "external net, networks that are not home net."); ?><br/>
+ <span class="red"><?php echo gettext("Hint:"); ?></span>&nbsp;<?php echo gettext("Most users should leave this " .
+ "setting at default."); ?><br/></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Block offenders</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Block offenders"); ?></td>
<td width="78%" class="vtable">
<input name="blockoffenders7" id="blockoffenders7" type="checkbox" value="on"
<?php if ($pconfig['blockoffenders7'] == "on") echo "checked"; ?>
onClick="enable_blockoffenders()"><br>
- Checking this option will automatically block hosts that generate a
- Snort alert.</td>
+ <?php echo gettext("Checking this option will automatically block hosts that generate a " .
+ "Snort alert."); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Kill states</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Kill states"); ?></td>
<td width="78%" class="vtable">
<input name="blockoffenderskill" id="blockoffenderskill" type="checkbox" value="on" <?php if ($pconfig['blockoffenderskill'] == "on") echo "checked"; ?>>
- <br/>Should firewall states be killed for the blocked ip
+ <br/<?php echo gettext("Should firewall states be killed for the blocked ip"); ?>>
</td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Which ip to block</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Which ip to block"); ?></td>
<td width="78%" class="vtable">
<select name="blockoffendersip" class="formselect" id="blockoffendersip">
<?php
@@ -345,11 +345,11 @@ function enable_change(enable_change) {
}
?>
</select>
- <br/> Which ip extracted from the packet you want to block
+ <br/><?php echo gettext("Which ip extracted from the packet you want to block"); ?>
</td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Whitelist</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Whitelist"); ?></td>
<td width="78%" class="vtable">
<select name="whitelistname" class="formselect" id="whitelistname">
<?php
@@ -366,14 +366,14 @@ function enable_change(enable_change) {
}
?>
</select><br>
- <span class="vexpl">Choose the whitelist you will like this rule to
- use. </span><br/>&nbsp;<br/><span class="red">Note:</span><br/>&nbsp;Default
- whitelist adds only local networks.<br/>
- <span class="red">Note:</span><br/>&nbsp;This option will only be used when block offenders is on.
+ <span class="vexpl"><?php echo gettext("Choose the whitelist you will like this rule to " .
+ "use."); ?> </span><br/>&nbsp;<br/><span class="red"><?php echo gettext("Note:"); ?></span><br/>&nbsp;<?php echo gettext("Default " .
+ "whitelist adds only local networks."); ?><br/>
+ <span class="red"><?php echo gettext("Note:"); ?></span><br/>&nbsp;<?php echo gettext("This option will only be used when block offenders is on."); ?>
</td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Suppression and filtering</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Suppression and filtering"); ?></td>
<td width="78%" class="vtable">
<select name="suppresslistname" class="formselect" id="suppresslistname">
<?php
@@ -391,33 +391,33 @@ function enable_change(enable_change) {
}
?>
</select><br>
- <span class="vexpl">Choose the suppression or filtering file you
- will like this rule to use. </span><br/>&nbsp;<br/><span class="red">Note:</span><br/>&nbsp;Default
- option disables suppression and filtering.</td>
+ <span class="vexpl"><?php echo gettext("Choose the suppression or filtering file you " .
+ "will like this rule to use."); ?> </span><br/>&nbsp;<br/><span class="red"><?php echo gettext("Note:"); ?></span><br/>&nbsp;<?php echo gettext("Default " .
+ "option disables suppression and filtering."); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Checksum checking</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Checksum checking"); ?></td>
<td width="78%" class="vtable">
<input name="cksumcheck" id="cksumcheck" type="checkbox" value="on" <?php if ($pconfig['cksumcheck'] == "on") echo "checked"; ?>>
- <br/>If ticked checksum checking on snort will be disabled to improve performance.
- <br/>Most of this is already done on the firewall/filter level
+ <br/<?php echo gettext("If ticked checksum checking on snort will be disabled to improve performance."); ?>>
+ <br/<?php echo gettext("Most of this is already done on the firewall/filter level"); ?>>
</td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Send alerts to main
- System logs</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Send alerts to main " .
+ "lSystem logs"); ?></td>
<td width="78%" class="vtable"><input name="alertsystemlog"
type="checkbox" value="on"
<?php if ($pconfig['alertsystemlog'] == "on") echo "checked"; ?>
onClick="enable_change(false)"><br>
- Snort will send Alerts to the firewall's system logs.</td>
+ <?php echo gettext("Snort will send Alerts to the firewall's system logs."); ?></td>
</tr>
<tr>
- <td colspan="2" valign="top" class="listtopic">Arguments here will
- be automatically inserted into the snort configuration.</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("Arguments here will " .
+ "be automatically inserted into the snort configuration."); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Advanced configuration pass through</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Advanced configuration pass through"); ?></td>
<td width="78%" class="vtable">
<textarea wrap="off" name="configpassthru" cols="65" rows="12" id="configpassthru"><?=htmlspecialchars($pconfig['configpassthru']);?></textarea>
@@ -431,9 +431,9 @@ function enable_change(enable_change) {
</tr>
<tr>
<td width="22%" valign="top">&nbsp;</td>
- <td width="78%"><span class="vexpl"><span class="red"><strong>Note:</strong></span><br/>
+ <td width="78%"><span class="vexpl"><span class="red"><strong><?php echo gettext("Note:"); ?></strong></span><br/>
<br>
- Please save your settings before you click start.
+ <?php echo gettext("Please save your settings before you click start."); ?>
</td>
</tr>
</table>
diff --git a/config/snort/snort_interfaces_global.php b/config/snort/snort_interfaces_global.php
index 6974a9c3..eb371119 100644
--- a/config/snort/snort_interfaces_global.php
+++ b/config/snort/snort_interfaces_global.php
@@ -129,30 +129,30 @@ if ($input_errors)
<td class="tabcont">
<table width="100%" border="0" cellpadding="6" cellspacing="0">
<tr>
- <td colspan="2" valign="top" class="listtopic">Please Choose The
- Type Of Rules You Wish To Download</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("Please Choose The " .
+ "Type Of Rules You Wish To Download"); ?></td>
</tr>
- <td width="22%" valign="top" class="vncell">Install Snort.org rules</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Install Snort.org rules"); ?></td>
<td width="78%" class="vtable">
<table cellpadding="0" cellspacing="0">
<tr>
<td colspan="2"><input name="snortdownload" type="radio"
id="snortdownload" value="off"
<?php if($pconfig['snortdownload']=='off' || $pconfig['snortdownload']=='') echo 'checked'; ?>>
- Do <strong>NOT</strong> Install</td>
+ <?php printf(gettext("Do %sNOT%s Install"), '<strong>', '</strong>'); ?></td>
</tr>
<tr>
<td colspan="2"><input name="snortdownload" type="radio"
id="snortdownload" value="on"
- <?php if($pconfig['snortdownload']=='on') echo 'checked'; ?>> Install
- Basic Rules or Premium rules <br>
+ <?php if($pconfig['snortdownload']=='on') echo 'checked'; ?>> <?php echo gettext("Install " .
+ "Basic Rules or Premium rules"); ?> <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a
- href="https://www.snort.org/signup" target="_blank">Sign Up for a
- Basic Rule Account</a><br>
+ href="https://www.snort.org/signup" target="_blank"><?php echo gettext("Sign Up for a " .
+ "Basic Rule Account"); ?></a><br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a
href="http://www.snort.org/vrt/buy-a-subscription"
- target="_blank">Sign Up for Sourcefire VRT Certified Premium
- Rules. This Is Highly Recommended</a></td>
+ target="_blank"><?php echo gettext("Sign Up for Sourcefire VRT Certified Premium " .
+ "Rules. This Is Highly Recommended"); ?></a></td>
</tr>
<tr>
<td>&nbsp;</td>
@@ -160,72 +160,72 @@ if ($input_errors)
</table>
<table width="100%" border="0" cellpadding="6" cellspacing="0">
<tr>
- <td colspan="2" valign="top" class="optsect_t2">Oinkmaster code</td>
+ <td colspan="2" valign="top" class="optsect_t2"><?php echo gettext("Oinkmaster code"); ?></td>
</tr>
<tr>
- <td class="vncell" valign="top">Code</td>
+ <td class="vncell" valign="top"><?php echo gettext("Code"); ?></td>
<td class="vtable"><input name="oinkmastercode" type="text"
class="formfld" id="oinkmastercode" size="52"
value="<?=htmlspecialchars($pconfig['oinkmastercode']);?>"><br>
- Obtain a snort.org Oinkmaster code and paste here.</td>
+ <?php echo gettext("Obtain a snort.org Oinkmaster code and paste here."); ?></td>
</table>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Install <strong>Emergingthreats</strong>
- rules</td>
+ <td width="22%" valign="top" class="vncell"><?php printf(gettext("Install %sEmergingthreats%s " .
+ "rules"), '<strong>' , '</strong>'); ?></td>
<td width="78%" class="vtable"><input name="emergingthreats"
type="checkbox" value="yes"
<?php if ($config['installedpackages']['snortglobal']['emergingthreats']=="on") echo "checked"; ?>
><br>
- Emerging Threats is an open source community that produces fastest
- moving and diverse Snort Rules.</td>
+ <?php echo gettext("Emerging Threats is an open source community that produces fastest " .
+ "moving and diverse Snort Rules."); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Update rules
- automatically</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Update rules " .
+ "automatically"); ?></td>
<td width="78%" class="vtable">
<select name="autorulesupdate7" class="formselect" id="autorulesupdate7">
<?php
- $interfaces3 = array('never_up' => 'NEVER', '6h_up' => '6 HOURS', '12h_up' => '12 HOURS', '1d_up' => '1 DAY', '4d_up' => '4 DAYS', '7d_up' => '7 DAYS', '28d_up' => '28 DAYS');
+ $interfaces3 = array('never_up' => gettext('NEVER'), '6h_up' => gettext('6 HOURS'), '12h_up' => gettext('12 HOURS'), '1d_up' => gettext('1 DAY'), '4d_up' => gettext('4 DAYS'), '7d_up' => gettext('7 DAYS'), '28d_up' => gettext('28 DAYS'));
foreach ($interfaces3 as $iface3 => $ifacename3): ?>
<option value="<?=$iface3;?>"
<?php if ($iface3 == $pconfig['autorulesupdate7']) echo "selected"; ?>>
<?=htmlspecialchars($ifacename3);?></option>
<?php endforeach; ?>
</select><br>
- <span class="vexpl">Please select the update times for rules.<br>
- Hint: in most cases, every 12 hours is a good choice.</span></td>
+ <span class="vexpl"><?php echo gettext("Please select the update times for rules."); ?><br>
+ <?php echo gettext("Hint: in most cases, every 12 hours is a good choice."); ?></span></td>
</tr>
<tr>
- <td colspan="2" valign="top" class="listtopic">General Settings</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("General Settings"); ?></td>
</tr>
<tr>
<?php $snortlogCurrentDSKsize = round(exec('df -k /var | grep -v "Filesystem" | awk \'{print $4}\'') / 1024); ?>
- <td width="22%" valign="top" class="vncell">Log Directory Size
- Limit<br/>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Log Directory Size " .
+ "Limit"); ?><br/>
<br/>
<br/>
- <span class="red"><strong>Note</span>:</strong><br>
- Available space is <strong><?php echo $snortlogCurrentDSKsize; ?>MB</strong></td>
+ <span class="red"><strong><?php echo gettext("Note"); ?></span>:</strong><br>
+ <?php echo gettext("Available space is"); ?> <strong><?php echo $snortlogCurrentDSKsize; ?>MB</strong></td>
<td width="78%" class="vtable">
<table cellpadding="0" cellspacing="0">
<tr>
<td colspan="2"><input name="snortloglimit" type="radio"
id="snortloglimit" value="on"
<?php if($pconfig['snortloglimit']=='on') echo 'checked'; ?>>
- <strong>Enable</strong> directory size limit (<strong>Default</strong>)</td>
+ <strong><?php echo gettext("Enable"); ?></strong> <?php echo gettext("directory size limit"); ?> (<strong><?php echo gettext("Default"); ?></strong>)</td>
</tr>
<tr>
<td colspan="2"><input name="snortloglimit" type="radio"
id="snortloglimit" value="off"
-<?php if($pconfig['snortloglimit']=='off') echo 'checked'; ?>> <strong>Disable</strong>
- directory size limit<br>
+<?php if($pconfig['snortloglimit']=='off') echo 'checked'; ?>> <strong><?php echo gettext("Disable"); ?></strong>
+ <?php echo gettext("directory size limit"); ?><br>
<br>
- <span class="red"><strong>Warning</span>:</strong> Nanobsd
- should use no more than 10MB of space.</td>
+ <span class="red"><strong><?php echo gettext("Warning"); ?></span>:</strong> <?php echo gettext("Nanobsd " .
+ "should use no more than 10MB of space."); ?></td>
</tr>
<tr>
<td>&nbsp;</td>
@@ -233,41 +233,41 @@ if ($input_errors)
</table>
<table width="100%" border="0" cellpadding="6" cellspacing="0">
<tr>
- <td class="vncell3">Size in <strong>MB</strong></td>
+ <td class="vncell3"><?php echo gettext("Size in"); ?> <strong>MB</strong></td>
<td class="vtable"><input name="snortloglimitsize" type="text"
class="formfld" id="snortloglimitsize" size="7"
value="<?=htmlspecialchars($pconfig['snortloglimitsize']);?>">
- Default is <strong>20%</strong> of available space.</td>
+ <?php echo gettext("Default is"); ?> <strong>20%</strong> <?php echo gettext("of available space."); ?></td>
</table>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Remove blocked hosts
- every</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Remove blocked hosts " .
+ "every"); ?></td>
<td width="78%" class="vtable">
<select name="rm_blocked" class="formselect" id="rm_blocked">
<?php
- $interfaces3 = array('never_b' => 'NEVER', '1h_b' => '1 HOUR', '3h_b' => '3 HOURS', '6h_b' => '6 HOURS', '12h_b' => '12 HOURS', '1d_b' => '1 DAY', '4d_b' => '4 DAYS', '7d_b' => '7 DAYS', '28d_b' => '28 DAYS');
+ $interfaces3 = array('never_b' => gettext('NEVER'), '1h_b' => gettext('1 HOUR'), '3h_b' => gettext('3 HOURS'), '6h_b' => gettext('6 HOURS'), '12h_b' => gettext('12 HOURS'), '1d_b' => gettext('1 DAY'), '4d_b' => gettext('4 DAYS'), '7d_b' => gettext('7 DAYS'), '28d_b' => gettext('28 DAYS'));
foreach ($interfaces3 as $iface3 => $ifacename3): ?>
<option value="<?=$iface3;?>"
<?php if ($iface3 == $pconfig['rm_blocked']) echo "selected"; ?>>
<?=htmlspecialchars($ifacename3);?></option>
<?php endforeach; ?>
</select><br>
- <span class="vexpl">Please select the amount of time you would like
- hosts to be blocked for.<br>
- Hint: in most cases, 1 hour is a good choice.</span></td>
+ <span class="vexpl"><?php echo gettext("Please select the amount of time you would like " .
+ "hosts to be blocked for."); ?><br>
+ <?php echo gettext("Hint: in most cases, 1 hour is a good choice."); ?></span></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Keep snort settings
- after deinstall</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Keep snort settings " .
+ "after deinstall"); ?></td>
<td width="78%" class="vtable"><input name="forcekeepsettings"
id="forcekeepsettings" type="checkbox" value="yes"
<?php if ($config['installedpackages']['snortglobal']['forcekeepsettings']=="on") echo "checked"; ?>
><br>
- Settings will not be removed during deinstall.</td>
+ <?php echo gettext("Settings will not be removed during deinstall."); ?></td>
</tr>
<tr>
<td width="22%" valign="top">
@@ -277,10 +277,10 @@ if ($input_errors)
</tr>
<tr>
<td width="22%" valign="top">&nbsp;</td>
- <td width="78%"><span class="vexpl"><span class="red"><strong>Note:<br>
- </strong></span> Changing any settings on this page will affect all
- interfaces. Please, double check if your oink code is correct and
- the type of snort.org account you hold.</span></td>
+ <td width="78%"><span class="vexpl"><span class="red"><strong><?php echo gettext("Note:"); ?><br>
+ </strong></span> <?php echo gettext("Changing any settings on this page will affect all " .
+ "interfaces. Please, double check if your oink code is correct and " .
+ "the type of snort.org account you hold."); ?></span></td>
</tr>
</table>
</td></tr>
diff --git a/config/snort/snort_interfaces_suppress.php b/config/snort/snort_interfaces_suppress.php
index 0efc7fa3..93d3f2dc 100644
--- a/config/snort/snort_interfaces_suppress.php
+++ b/config/snort/snort_interfaces_suppress.php
@@ -86,8 +86,8 @@ if($pfsense_stable == 'yes'){echo '<p class="pgtitle">' . $pgtitle . '</p>';}
<tr><td class="tabcont">
<table width="100%" border="0" cellpadding="0" cellspacing="0">
<tr>
- <td width="30%" class="listhdrr">File Name</td>
- <td width="60%" class="listhdr">Description</td>
+ <td width="30%" class="listhdrr"><?php echo gettext("File Name"); ?></td>
+ <td width="60%" class="listhdr"><?php echo gettext("Description"); ?></td>
<td width="10%" class="list"></td>
</tr>
<?php $i = 0; foreach ($a_suppress as $list): ?>
@@ -106,12 +106,12 @@ if($pfsense_stable == 'yes'){echo '<p class="pgtitle">' . $pgtitle . '</p>';}
<td valign="middle"><a
href="snort_interfaces_suppress_edit.php?id=<?=$i;?>"><img
src="/themes/<?= $g['theme']; ?>/images/icons/icon_e.gif"
- width="17" height="17" border="0" title="edit whitelist"></a></td>
+ width="17" height="17" border="0" title="<?php echo gettext("edit whitelist"); ?>"></a></td>
<td><a
href="/snort/snort_interfaces_suppress.php?act=del&id=<?=$i;?>"
- onclick="return confirm('Do you really want to delete this whitelist? All elements that still use it will become invalid (e.g. snort rules will fall back to the default whitelist)!')"><img
+ onclick="return confirm('<?php echo gettext("Do you really want to delete this whitelist? All elements that still use it will become invalid (e.g. snort rules will fall back to the default whitelist)!"); ?>')"><img
src="/themes/<?= $g['theme']; ?>/images/icons/icon_x.gif"
- width="17" height="17" border="0" title="delete whitelist"></a></td>
+ width="17" height="17" border="0" title="<?php echo gettext("delete whitelist"); ?>"></a></td>
</tr>
</table>
</td>
@@ -126,7 +126,7 @@ if($pfsense_stable == 'yes'){echo '<p class="pgtitle">' . $pgtitle . '</p>';}
<td valign="middle"><a
href="snort_interfaces_suppress_edit.php?id=<?php echo $id_gen;?> "><img
src="/themes/<?= $g['theme']; ?>/images/icons/icon_plus.gif"
- width="17" height="17" border="0" title="add a new list"></a></td>
+ width="17" height="17" border="0" title="<?php echo gettext("add a new list"); ?>"></a></td>
</tr>
</table>
</td>
@@ -134,11 +134,11 @@ if($pfsense_stable == 'yes'){echo '<p class="pgtitle">' . $pgtitle . '</p>';}
</table>
</td></tr>
<tr>
- <td colspan="3" width="100%"><span class="vexpl"><span class="red"><strong>Note:</strong></span>
- <p><span class="vexpl">Here you can create event filtering and
- suppression for your snort package rules.<br>
- Please note that you must restart a running rule so that changes can
- take effect.</span></p></td>
+ <td colspan="3" width="100%"><span class="vexpl"><span class="red"><strong><?php echo gettext("Note:"); ?></strong></span>
+ <p><span class="vexpl"><?php echo gettext("Here you can create event filtering and " .
+ "suppression for your snort package rules."); ?><br>
+ <?php echo gettext("Please note that you must restart a running rule so that changes can " .
+ "take effect."); ?></span></p></td>
</tr>
</table>
</form>
diff --git a/config/snort/snort_interfaces_suppress_edit.php b/config/snort/snort_interfaces_suppress_edit.php
index 45f47a46..782b9784 100644
--- a/config/snort/snort_interfaces_suppress_edit.php
+++ b/config/snort/snort_interfaces_suppress_edit.php
@@ -147,19 +147,19 @@ if ($savemsg)
<td colspan="2" class="listtopic">Add the name and description of the file.</td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncellreq">Name</td>
+ <td width="22%" valign="top" class="vncellreq"><?php echo gettext("Name"); ?></td>
<td width="78%" class="vtable"><input name="name" type="text" id="name"
class="formfld unkown" size="40" value="<?=htmlspecialchars($pconfig['name']);?>" /> <br />
- <span class="vexpl"> The list name may only consist of the
- characters a-z, A-Z and 0-9. <span class="red">Note: </span> No
- Spaces. </span></td>
+ <span class="vexpl"> <?php echo gettext("The list name may only consist of the " .
+ "characters a-z, A-Z and 0-9."); ?> <span class="red"><?php echo gettext("Note:"); ?> </span>
+ <?php echo gettext("No Spaces."); ?> </span></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Description</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Description"); ?></td>
<td width="78%" class="vtable"><input name="descr" type="text"
class="formfld unkown" id="descr" size="40" value="<?=$pconfig['descr'];?>" /> <br />
- <span class="vexpl"> You may enter a description here for your
- reference (not parsed). </span></td>
+ <span class="vexpl"> <?php echo gettext("You may enter a description here for your " .
+ "reference (not parsed)."); ?> </span></td>
</tr>
<tr>
<td colspan="2">
@@ -167,30 +167,30 @@ if ($savemsg)
<table width='100%'>
<tr>
<td width='8%'>&nbsp;&nbsp;&nbsp;</td>
- <td width='70%'><font size="2" color='#FF850A'><b>NOTE:</b></font>
- <font color='#000000'>&nbsp;&nbsp;The threshold keyword
- is deprecated as of version 2.8.5. Use the event_filter keyword
- instead.</font></td>
+ <td width='70%'><font size="2" color='#FF850A'><b><?php echo gettext("NOTE:"); ?></b></font>
+ <font color='#000000'>&nbsp;&nbsp;<?php echo gettext("The threshold keyword " .
+ "is deprecated as of version 2.8.5. Use the event_filter keyword " .
+ "instead."); ?></font></td>
</tr>
</table>
</div>
</td>
</tr>
<tr>
- <td colspan="2" valign="top" class="listtopic">Apply suppression or
- filters to rules. Valid keywords are 'suppress', 'event_filter' and
- 'rate_filter'.</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("Apply suppression or " .
+ "filters to rules. Valid keywords are 'suppress', 'event_filter' and " .
+ "'rate_filter'."); ?></td>
</tr>
<tr>
- <td colspan="2" valign="top" class="vncell"><b>Example 1;</b>
+<td colspan="2" valign="top" class="vncell"><b><?php echo gettext("Example 1;"); ?></b>
suppress gen_id 1, sig_id 1852, track by_src, ip 10.1.1.54<br>
- <b>Example 2;</b> event_filter gen_id 1, sig_id 1851, type limit,
+ <b><?php echo gettext("Example 2;"); ?></b> event_filter gen_id 1, sig_id 1851, type limit,
track by_src, count 1, seconds 60<br>
- <b>Example 3;</b> rate_filter gen_id 135, sig_id 1, track by_src,
+ <b><?php echo gettext("Example 3;"); ?></b> rate_filter gen_id 135, sig_id 1, track by_src,
count 100, seconds 1, new_action log, timeout 10</td>
</tr>
<tr>
- <td width="10%" class="vncell">&nbsp;Advanced pass through</td>
+ <td width="10%" class="vncell">&nbsp;<?php echo gettext("Advanced pass through"); ?></td>
<td width="100%" class="vtable"><textarea wrap="off"
name="suppresspassthru" cols="90" rows="28" id="suppresspassthru" class="formpre"><?=htmlspecialchars($pconfig['suppresspassthru']);?></textarea>
</td>
diff --git a/config/snort/snort_interfaces_whitelist.php b/config/snort/snort_interfaces_whitelist.php
index 294deef2..f90cbe1f 100644
--- a/config/snort/snort_interfaces_whitelist.php
+++ b/config/snort/snort_interfaces_whitelist.php
@@ -124,12 +124,12 @@ if ($savemsg) print_info_box($savemsg);
<td valign="middle"><a
href="snort_interfaces_whitelist_edit.php?id=<?=$i;?>"><img
src="/themes/<?= $g['theme']; ?>/images/icons/icon_e.gif"
- width="17" height="17" border="0" title="edit whitelist"></a></td>
+ width="17" height="17" border="0" title="<?php echo gettext("edit whitelist"); ?>"></a></td>
<td><a
href="/snort/snort_interfaces_whitelist.php?act=del&id=<?=$i;?>"
- onclick="return confirm('Do you really want to delete this whitelist? All elements that still use it will become invalid (e.g. snort rules will fall back to the default whitelist)!')"><img
+ onclick="return confirm('<?php echo gettext("Do you really want to delete this whitelist? All elements that still use it will become invalid (e.g. snort rules will fall back to the default whitelist)!"); ?>')"><img
src="/themes/<?= $g['theme']; ?>/images/icons/icon_x.gif"
- width="17" height="17" border="0" title="delete whitelist"></a></td>
+ width="17" height="17" border="0" title="<?php echo gettext("delete whitelist"); ?>"></a></td>
</tr>
</table>
</td>
@@ -144,7 +144,7 @@ if ($savemsg) print_info_box($savemsg);
<td valign="middle"><a
href="snort_interfaces_whitelist_edit.php?id=<?php echo $id_gen;?> "><img
src="/themes/<?= $g['theme']; ?>/images/icons/icon_plus.gif"
- width="17" height="17" border="0" title="add a new list"></a></td>
+ width="17" height="17" border="0" title="<?php echo gettext("add a new list"); ?>"></a></td>
</tr>
</table>
</td>
@@ -156,13 +156,13 @@ if ($savemsg) print_info_box($savemsg);
<br>
<table width="100%" border="0" cellpadding="0"
cellspacing="0">
- <td width="100%"><span class="vexpl"><span class="red"><strong>Note:</strong></span>
- <p><span class="vexpl">Here you can create whitelist files for your
- snort package rules.<br>
- Please add all the ips or networks you want to protect against snort
- block decisions.<br>
- Remember that the default whitelist only includes local networks.<br>
- Be careful, it is very easy to get locked out of you system.</span></p></td>
+ <td width="100%"><span class="vexpl"><span class="red"><strong><?php echo gettext("Note:"); ?></strong></span>
+ <p><span class="vexpl"><?php echo gettext("Here you can create whitelist files for your " .
+ "snort package rules."); ?><br>
+ <?php echo gettext("Please add all the ips or networks you want to protect against snort " .
+ "block decisions."); ?><br>
+ <?php echo gettext("Remember that the default whitelist only includes local networks."); ?><br>
+ <?php echo gettext("Be careful, it is very easy to get locked out of you system."); ?></span></p></td>
</table>
</form>
<?php include("fend.inc"); ?>
diff --git a/config/snort/snort_interfaces_whitelist_edit.php b/config/snort/snort_interfaces_whitelist_edit.php
index c86f60d3..378530ba 100644
--- a/config/snort/snort_interfaces_whitelist_edit.php
+++ b/config/snort/snort_interfaces_whitelist_edit.php
@@ -99,10 +99,10 @@ if ($_POST['submit']) {
do_input_validation($_POST, $reqdfields, $reqdfieldsn, &$input_errors);
if(strtolower($_POST['name']) == "defaultwhitelist")
- $input_errors[] = "Whitelist file names may not be named defaultwhitelist.";
+ $input_errors[] = gettext("Whitelist file names may not be named defaultwhitelist.");
if (is_validwhitelistname($_POST['name']) == false)
- $input_errors[] = "Whitelist file name may only consist of the characters a-z, A-Z and 0-9 _. Note: No Spaces. Press Cancel to reset.";
+ $input_errors[] = gettext("Whitelist file name may only consist of the characters a-z, A-Z and 0-9 _. Note: No Spaces. Press Cancel to reset.");
/* check for name conflicts */
foreach ($a_whitelist as $w_list) {
@@ -110,14 +110,14 @@ if ($_POST['submit']) {
continue;
if ($w_list['name'] == $_POST['name']) {
- $input_errors[] = "A whitelist file name with this name already exists.";
+ $input_errors[] = gettext("A whitelist file name with this name already exists.");
break;
}
}
if ($_POST['address'])
if (!is_alias($_POST['address']))
- $input_errors[] = "A valid alias need to be provided";
+ $input_errors[] = gettext("A valid alias need to be provided");
if (!$input_errors) {
$w_list = array();
@@ -171,70 +171,68 @@ if ($savemsg)
<tr><td class="tabcont">
<table width="100%" border="0" cellpadding="6" cellspacing="0">
<tr>
- <td colspan="2" valign="top" class="listtopic">Add the name and
- description of the file.</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("Add the name and " .
+ "description of the file."); ?></td>
</tr>
<tr>
- <td valign="top" class="vncellreq">Name</td>
+ <td valign="top" class="vncellreq"><?php echo gettext("Name"); ?></td>
<td class="vtable"><input name="name" type="text" id="name"
size="40" value="<?=htmlspecialchars($pconfig['name']);?>" /> <br />
- <span class="vexpl"> The list name may only consist of the
- characters a-z, A-Z and 0-9. <span class="red">Note: </span> No
- Spaces. </span></td>
+ <span class="vexpl"> <?php echo gettext("The list name may only consist of the " .
+ "characters a-z, A-Z and 0-9."); ?> <span class="red"><?php echo gettext("Note:"); ?> </span>
+ <?php echo gettext("No Spaces."); ?> </span></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Description</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Description"); ?></td>
<td width="78%" class="vtable"><input name="descr" type="text"
id="descr" size="40" value="<?=$pconfig['descr'];?>" /> <br />
- <span class="vexpl"> You may enter a description here for your
- reference (not parsed). </span></td>
+ <span class="vexpl"> <?php echo gettext("You may enter a description here for your " .
+ "reference (not parsed)."); ?> </span></td>
</tr>
<tr>
- <td colspan="2" valign="top" class="listtopic">Add auto generated
- ips.</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("Add auto generated ips."); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">WAN IPs</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("WAN IPs"); ?></td>
<td width="78%" class="vtable"><input name="wanips" type="checkbox"
id="wanips" size="40" value="yes"
<?php if($pconfig['wanips'] == 'yes'){ echo "checked";} if($pconfig['wanips'] == ''){ echo "checked";} ?> />
- <span class="vexpl"> Add WAN IPs to the list. </span></td>
+ <span class="vexpl"> <?php echo gettext("Add WAN IPs to the list."); ?> </span></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Wan Gateways</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Wan Gateways"); ?></td>
<td width="78%" class="vtable"><input name="wangateips"
type="checkbox" id="wangateips" size="40" value="yes"
<?php if($pconfig['wangateips'] == 'yes'){ echo "checked";} if($pconfig['wangateips'] == ''){ echo "checked";} ?> />
- <span class="vexpl"> Add WAN Gateways to the list. </span></td>
+ <span class="vexpl"> <?php echo gettext("Add WAN Gateways to the list."); ?> </span></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Wan DNS servers</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Wan DNS servers"); ?></td>
<td width="78%" class="vtable"><input name="wandnsips"
type="checkbox" id="wandnsips" size="40" value="yes"
<?php if($pconfig['wandnsips'] == 'yes'){ echo "checked";} if($pconfig['wandnsips'] == ''){ echo "checked";} ?> />
- <span class="vexpl"> Add WAN DNS servers to the list. </span></td>
+ <span class="vexpl"> <?php echo gettext("Add WAN DNS servers to the list."); ?> </span></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Virtual IP Addresses</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Virtual IP Addresses"); ?></td>
<td width="78%" class="vtable"><input name="vips" type="checkbox"
id="vips" size="40" value="yes"
<?php if($pconfig['vips'] == 'yes'){ echo "checked";} if($pconfig['vips'] == ''){ echo "checked";} ?> />
- <span class="vexpl"> Add Virtual IP Addresses to the list. </span></td>
+ <span class="vexpl"> <?php echo gettext("Add Virtual IP Addresses to the list."); ?> </span></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">VPNs</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("VPNs"); ?></td>
<td width="78%" class="vtable"><input name="vpnips" type="checkbox"
id="vpnips" size="40" value="yes"
<?php if($pconfig['vpnips'] == 'yes'){ echo "checked";} if($pconfig['vpnips'] == ''){ echo "checked";} ?> />
- <span class="vexpl"> Add VPN Addresses to the list. </span></td>
+ <span class="vexpl"> <?php echo gettext("Add VPN Addresses to the list."); ?> </span></td>
</tr>
<tr>
- <td colspan="2" valign="top" class="listtopic">Add your own custom
- ips.</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("Add your own custom ips."); ?></td>
</tr>
<tr>
<td width="22%" valign="top" class="vncellreq">
- <div id="addressnetworkport">Alias of IP's</div>
+ <div id="addressnetworkport"><?php echo gettext("Alias of IP's"); ?></div>
</td>
<td width="78%" class="vtable">
<input autocomplete="off" name="address" type="text" class="formfldalias" id="address" size="30" value="<?=htmlspecialchars($pconfig['address']);?>" />
diff --git a/config/snort/snort_preprocessors.php b/config/snort/snort_preprocessors.php
index dc68db3f..d59af640 100644
--- a/config/snort/snort_preprocessors.php
+++ b/config/snort/snort_preprocessors.php
@@ -162,184 +162,178 @@ include_once("head.inc");
<table width="100%" border="0" cellpadding="6" cellspacing="0">
<tr>
<td width="22%" valign="top">&nbsp;</td>
- <td width="78%"><span class="vexpl"><span class="red"><strong>Note:
+ <td width="78%"><span class="vexpl"><span class="red"><strong<?php echo gettext("Note:"); ?>>
</strong></span><br>
- Rules may be dependent on preprocessors!<br>
- Defaults will be used when there is no user input.<br></td>
+ <?php echo gettext("Rules may be dependent on preprocessors!"); ?><br>
+ <?php echo gettext("Defaults will be used when there is no user input."); ?><br></td>
</tr>
<tr>
- <td colspan="2" valign="top" class="listtopic">Performance
- Statistics</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("Performance Statistics"); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Enable</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Enable"); ?></td>
<td width="78%" class="vtable"><input name="perform_stat"
type="checkbox" value="on"
<?php if ($pconfig['perform_stat']=="on") echo "checked"; ?>
- onClick="enable_change(false)"> Performance Statistics for this
- interface.</td>
+ onClick="enable_change(false)"> <?php echo gettext("Performance Statistics for this interface."); ?></td>
</tr>
<tr>
- <td colspan="2" valign="top" class="listtopic">HTTP Inspect Settings</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("HTTP Inspect Settings"); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Enable</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Enable"); ?></td>
<td width="78%" class="vtable"><input name="http_inspect"
type="checkbox" value="on"
<?php if ($pconfig['http_inspect']=="on") echo "checked"; ?>
- onClick="enable_change(false)"> Use HTTP Inspect to
- Normalize/Decode and detect HTTP traffic and protocol anomalies.</td>
+ onClick="enable_change(false)"> <?php echo gettext("Use HTTP Inspect to " .
+ "Normalize/Decode and detect HTTP traffic and protocol anomalies."); ?></td>
</tr>
<tr>
- <td valign="top" class="vncell">HTTP server flow depth</td>
+ <td valign="top" class="vncell"><?php echo gettext("HTTP server flow depth"); ?></td>
<td class="vtable">
<table cellpadding="0" cellspacing="0">
<tr>
<td><input name="flow_depth" type="text" class="formfld"
id="flow_depth" size="5"
- value="<?=htmlspecialchars($pconfig['flow_depth']);?>"> <strong>-1</strong>
- to <strong>1460</strong> (<strong>-1</strong> disables HTTP
- inspect, <strong>0</strong> enables all HTTP inspect)</td>
+ value="<?=htmlspecialchars($pconfig['flow_depth']);?>"> <?php echo gettext("<strong>-1</strong> " .
+ "to <strong>1460</strong> (<strong>-1</strong> disables HTTP " .
+ "inspect, <strong>0</strong> enables all HTTP inspect)"); ?></td>
</tr>
</table>
- Amount of HTTP server response payload to inspect. Snort's
- performance may increase by adjusting this value.<br>
- Setting this value too low may cause false negatives. Values above 0
- are specified in bytes. Default value is <strong>0</strong><br>
+ <?php echo gettext("Amount of HTTP server response payload to inspect. Snort's " .
+ "performance may increase by adjusting this value."); ?><br>
+ <?php echo gettext("Setting this value too low may cause false negatives. Values above 0 " .
+ "are specified in bytes. Default value is <strong>0</strong>"); ?><br>
</td>
</tr>
<tr>
- <td colspan="2" valign="top" class="listtopic">Stream5 Settings</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("Stream5 Settings"); ?></td>
</tr>
<tr>
- <td valign="top" class="vncell">Max Queued Bytes</td>
+ <td valign="top" class="vncell"><?php echo gettext("Max Queued Bytes"); ?></td>
<td class="vtable">
<table cellpadding="0" cellspacing="0">
<tr>
<td><input name="max_queued_bytes" type="text" class="formfld"
id="max_queued_bytes" size="5"
value="<?=htmlspecialchars($pconfig['max_queued_bytes']);?>">
- Minimum is <strong>1024</strong>, Maximum is <strong>1073741824</strong>
- ( default value is <strong>1048576</strong>, <strong>0</strong>
- means Maximum )</td>
+ <?php echo gettext("Minimum is <strong>1024</strong>, Maximum is <strong>1073741824</strong> " .
+ "( default value is <strong>1048576</strong>, <strong>0</strong> " .
+ "means Maximum )"); ?></td>
</tr>
</table>
- The number of bytes to be queued for reassembly for TCP sessions in
- memory. Default value is <strong>1048576</strong><br>
+ <?php echo gettext("The number of bytes to be queued for reassembly for TCP sessions in " .
+ "memory. Default value is <strong>1048576</strong>"); ?><br>
</td>
</tr>
<tr>
- <td valign="top" class="vncell">Max Queued Segs</td>
+ <td valign="top" class="vncell"><?php echo gettext("Max Queued Segs"); ?></td>
<td class="vtable">
<table cellpadding="0" cellspacing="0">
<tr>
<td><input name="max_queued_segs" type="text" class="formfld"
id="max_queued_segs" size="5"
value="<?=htmlspecialchars($pconfig['max_queued_segs']);?>">
- Minimum is <strong>2</strong>, Maximum is <strong>1073741824</strong>
- ( default value is <strong>2621</strong>, <strong>0</strong> means
- Maximum )</td>
+ <?php echo gettext("Minimum is <strong>2</strong>, Maximum is <strong>1073741824</strong> " .
+ "( default value is <strong>2621</strong>, <strong>0</strong> means " .
+ "Maximum )"); ?></td>
</tr>
</table>
- The number of segments to be queued for reassembly for TCP sessions
- in memory. Default value is <strong>2621</strong><br>
+ <?php echo gettext("The number of segments to be queued for reassembly for TCP sessions " .
+ "in memory. Default value is <strong>2621</strong>"); ?><br>
</td>
</tr>
<tr>
- <td colspan="2" valign="top" class="listtopic">General Preprocessor
- Settings</td>
+ <td colspan="2" valign="top" class="listtopic"><?php echo gettext("General Preprocessor Settings"); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Enable <br>
- RPC Decode and Back Orifice detector</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Enable"); ?> <br>
+ <?php echo gettext("RPC Decode and Back Orifice detector"); ?></td>
<td width="78%" class="vtable"><input name="other_preprocs"
type="checkbox" value="on"
<?php if ($pconfig['other_preprocs']=="on") echo "checked"; ?>
onClick="enable_change(false)"><br>
- Normalize/Decode RPC traffic and detects Back Orifice traffic on the
- network.</td>
+ <?php echo gettext("Normalize/Decode RPC traffic and detects Back Orifice traffic on the network."); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Enable <br>
- FTP and Telnet Normalizer</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Enable"); ?> <br>
+ <?php echo gettext("FTP and Telnet Normalizer"); ?></td>
<td width="78%" class="vtable"><input name="ftp_preprocessor"
type="checkbox" value="on"
<?php if ($pconfig['ftp_preprocessor']=="on") echo "checked"; ?>
onClick="enable_change(false)"><br>
- Normalize/Decode FTP and Telnet traffic and protocol anomalies.</td>
+ <?php echo gettext("Normalize/Decode FTP and Telnet traffic and protocol anomalies."); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Enable <br>
- SMTP Normalizer</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Enable"); ?> <br>
+ <?php echo gettext("SMTP Normalizer"); ?></td>
<td width="78%" class="vtable"><input name="pop_preproc"
type="checkbox" value="on"
<?php if ($pconfig['pop_preproc']=="on") echo "checked"; ?>
onClick="enable_change(false)"><br>
- Normalize/Decode POP protocol for enforcement and buffer overflows.</td>
+ <?php echo gettext("Normalize/Decode POP protocol for enforcement and buffer overflows."); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Enable <br>
- SMTP Normalizer</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Enable"); ?> <br>
+ <?php echo gettext("SMTP Normalizer"); ?></td>
<td width="78%" class="vtable"><input name="imap_preproc"
type="checkbox" value="on"
<?php if ($pconfig['imap_preproc']=="on") echo "checked"; ?>
onClick="enable_change(false)"><br>
- Normalize/Decode IMAP protocol for enforcement and buffer overflows.</td>
+ <?php echo gettext("Normalize/Decode IMAP protocol for enforcement and buffer overflows."); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Enable <br>
- SMTP Normalizer</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Enable"); ?> <br>
+ <?php echo gettext("SMTP Normalizer"); ?></td>
<td width="78%" class="vtable"><input name="smtp_preprocessor"
type="checkbox" value="on"
<?php if ($pconfig['smtp_preprocessor']=="on") echo "checked"; ?>
onClick="enable_change(false)"><br>
- Normalize/Decode SMTP protocol for enforcement and buffer overflows.</td>
+ <?php echo gettext("Normalize/Decode SMTP protocol for enforcement and buffer overflows."); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Enable <br>
- Portscan Detection</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Enable"); ?> <br>
+ <?php echo gettext("Portscan Detection"); ?></td>
<td width="78%" class="vtable"><input name="sf_portscan"
type="checkbox" value="on"
<?php if ($pconfig['sf_portscan']=="on") echo "checked"; ?>
onClick="enable_change(false)"><br>
- Detects various types of portscans and portsweeps.</td>
+ <?php echo gettext("Detects various types of portscans and portsweeps."); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Enable <br>
- DCE/RPC2 Detection</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Enable"); ?> <br>
+ <?php echo gettext("DCE/RPC2 Detection"); ?></td>
<td width="78%" class="vtable"><input name="dce_rpc_2"
type="checkbox" value="on"
<?php if ($pconfig['dce_rpc_2']=="on") echo "checked"; ?>
onClick="enable_change(false)"><br>
- The DCE/RPC preprocessor detects and decodes SMB and DCE/RPC
- traffic.</td>
+ <?php echo gettext("The DCE/RPC preprocessor detects and decodes SMB and DCE/RPC traffic."); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Enable <br>
- DNS Detection</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Enable"); ?> <br>
+ <?php echo gettext("DNS Detection"); ?></td>
<td width="78%" class="vtable"><input name="dns_preprocessor"
type="checkbox" value="on"
<?php if ($pconfig['dns_preprocessor']=="on") echo "checked"; ?>
onClick="enable_change(false)"><br>
- The DNS preprocessor decodes DNS Response traffic and detects some
- vulnerabilities.</td>
+ <?php echo gettext("The DNS preprocessor decodes DNS Response traffic and detects some vulnerabilities."); ?></td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Enable <br> SSL Data</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Enable"); ?> <br> <?php echo gettext("SSL Data"); ?></td>
<td width="78%" class="vtable">
<input name="ssl_preproc" type="checkbox" value="on"
<?php if ($pconfig['ssl_preproc']=="on") echo "checked"; ?>
onClick="enable_change(false)"><br>
- SSL data searches for irregularities during SSL protocol exchange
+ <?php echo gettext("SSL data searches for irregularities during SSL protocol exchange"); ?>
</td>
</tr>
<tr>
- <td width="22%" valign="top" class="vncell">Enable <br> Sensitive Data</td>
+ <td width="22%" valign="top" class="vncell"><?php echo gettext("Enable"); ?> <br> <?php echo gettext("Sensitive Data"); ?></td>
<td width="78%" class="vtable">
<input name="sensitive_data" type="checkbox" value="on"
<?php if ($pconfig['sensitive_data']=="on") echo "checked"; ?>
onClick="enable_change(false)"><br>
- Sensisitive data searches for CC or SS# in data
+ <?php echo gettext("Sensisitive data searches for CC or SS# in data"); ?>
</td>
</tr>
<tr>
@@ -350,9 +344,9 @@ include_once("head.inc");
</tr>
<tr>
<td width="22%" valign="top">&nbsp;</td>
- <td width="78%"><span class="vexpl"><span class="red"><strong>Note:</strong></span>
+ <td width="78%"><span class="vexpl"><span class="red"><strong><?php echo gettext("Note:"); ?></strong></span>
<br>
- Please save your settings before you click Start. </td>
+ <?php echo gettext("Please save your settings before you click Start."); ?> </td>
</tr>
</table>
</td></tr></table>
diff --git a/config/snort/snort_rules.php b/config/snort/snort_rules.php
index 768469d1..c8a38ddb 100644
--- a/config/snort/snort_rules.php
+++ b/config/snort/snort_rules.php
@@ -280,13 +280,13 @@ function popup(url)
</tr>
<tr id="frheader">
<td width="3%" class="list">&nbsp;</td>
- <td width="7%" class="listhdr">SID</td>
- <td width="4%" class="listhdrr">Proto</td>
- <td width="15%" class="listhdrr">Source</td>
- <td width="10%" class="listhdrr">Port</td>
- <td width="15%" class="listhdrr">Destination</td>
- <td width="10%" class="listhdrr">Port</td>
- <td width="30%" class="listhdrr">Message</td>
+ <td width="7%" class="listhdr"><?php echo gettext("SID"); ?></td>
+ <td width="4%" class="listhdrr"><?php echo gettext("Proto"); ?></td>
+ <td width="15%" class="listhdrr"><?php echo gettext("Source"); ?></td>
+ <td width="10%" class="listhdrr"><?php echo gettext("Port"); ?></td>
+ <td width="15%" class="listhdrr"><?php echo gettext("Destination"); ?></td>
+ <td width="10%" class="listhdrr"><?php echo gettext("Port"); ?></td>
+ <td width="30%" class="listhdrr"><?php echo gettext("Message"); ?></td>
<td width="5%" class="list">&nbsp;</td>
</tr>
<?php
@@ -339,7 +339,7 @@ function popup(url)
<a href='?id={$id}&openruleset={$currentruleset}&act=toggle&ids={$counter}'>
<img src='../themes/{$g['theme']}/images/icons/{$iconb}'
width='10' height='10' border='0'
- title='click to toggle enabled/disabled status'></a>
+ title='" . gettext("click to toggle enabled/disabled status") . "'></a>
$textse
</td>
<td width='7%' class=\"listlr\">
@@ -370,7 +370,7 @@ function popup(url)
<td><a href="javascript: void(0)"
onclick="popup('snort_rules_edit.php?id=<?=$id;?>&openruleset=<?=$currentruleset;?>')"><img
src="../themes/<?= $g['theme']; ?>/images/icons/icon_right.gif"
- title="edit rule" width="17" height="17" border="0"></a></td>
+ title="<?php echo gettext("edit rule"); ?>" width="17" height="17" border="0"></a></td>
<!-- Codes by Quackit.com -->
</tr>
</table>
@@ -392,13 +392,13 @@ function popup(url)
<td width="16"><img
src="../themes/<?= $g['theme']; ?>/images/icons/icon_block.gif"
width="11" height="11"></td>
- <td>Rule Enabled</td>
+ <td><?php echo gettext("Rule Enabled"); ?></td>
</tr>
<tr>
<td><img
src="../themes/<?= $g['theme']; ?>/images/icons/icon_block_d.gif"
width="11" height="11"></td>
- <td nowrap>Rule Disabled</td>
+ <td nowrap><?php echo gettext("Rule Disabled"); ?></td>
</tr>
<tr>
<td colspan="10">
diff --git a/config/snort/snort_rulesets.php b/config/snort/snort_rulesets.php
index 5434470e..cfaa7d18 100644
--- a/config/snort/snort_rulesets.php
+++ b/config/snort/snort_rulesets.php
@@ -204,8 +204,8 @@ if ($savemsg) {
?>
<tr>
<td>
- # The rules directory is empty. <?=$snortdir;?>/rules <br/>
- Please go to the updates page to download/fetch the rules configured.
+ <?php printf(gettext("# The rules directory is empty. %s/rules"), $snortdir); ?> <br/>
+ <?php echo gettext("Please go to the updates page to download/fetch the rules configured."); ?>
</td>
</tr>
<?php else:
@@ -221,7 +221,7 @@ if ($savemsg) {
<table id="sortabletable1" class="sortable" width="100%" border="0"
cellpadding="0" cellspacing="0">
<tr>
- <td colspan="6" class="listtopic">Check the rulesets that you would like Snort to load at startup.<br/><br/></td>
+ <td colspan="6" class="listtopic"><?php echo gettext("Check the rulesets that you would like Snort to load at startup."); ?><br/><br/></td>
</tr>
<tr>
<td colspan="2" valign="center"><br/><input value="Save" type="submit" name="Submit" id="Submit" /><br/<br/></td>
@@ -231,18 +231,18 @@ if ($savemsg) {
<tr> <td colspan="6">&nbsp;</td> </tr>
<tr id="frheader">
<?php if ($emergingdownload == 'on'): ?>
- <td width="5%" class="listhdrr">Enabled</td>
- <td width="25%" class="listhdrr"><?php echo 'Ruleset: Emerging Threats.';?></td>
+ <td width="5%" class="listhdrr"><?php echo gettext("Enabled"); ?></td>
+ <td width="25%" class="listhdrr"><?php echo gettext('Ruleset: Emerging Threats.');?></td>
<?php else: ?>
- <td colspan="2" width="30%" class="listhdrr">Emerging rules have not been enabled</td>
+ <td colspan="2" width="30%" class="listhdrr"><?php echo gettext("Emerging rules have not been enabled"); ?></td>
<?php endif; ?>
<?php if ($snortdownload == 'on'): ?>
- <td width="5%" class="listhdrr">Enabled</td>
- <td width="25%" class="listhdrr"><?php echo 'Ruleset: Snort';?></td>
- <td width="5%" class="listhdrr">Enabled</td>
- <td width="25%" class="listhdrr"><?php echo 'Ruleset: Snort SO';?></td>
+ <td width="5%" class="listhdrr"><?php echo gettext("Enabled"); ?></td>
+ <td width="25%" class="listhdrr"><?php echo gettext('Ruleset: Snort');?></td>
+ <td width="5%" class="listhdrr"><?php echo gettext("Enabled"); ?></td>
+ <td width="25%" class="listhdrr"><?php echo gettext('Ruleset: Snort SO');?></td>
<?php else: ?>
- <td colspan="2" width="60%" class="listhdrr">Snort rules have not been enabled</td>
+ <td colspan="2" width="60%" class="listhdrr"><?php echo gettext("Snort rules have not been enabled"); ?></td>
<?php endif; ?>
</tr>
<?php
diff --git a/config/squid-reverse/proxy_monitor.sh b/config/squid-reverse/proxy_monitor.sh
index a6d58e9b..17de3997 100644
--- a/config/squid-reverse/proxy_monitor.sh
+++ b/config/squid-reverse/proxy_monitor.sh
@@ -27,6 +27,10 @@
# POSSIBILITY OF SUCH DAMAGE.
#
+if [ `pgrep -f "proxy_monitor.sh"|wc -l` -ge 1 ]; then
+ exit 0
+fi
+
set -e
LOOP_SLEEP=55
diff --git a/config/squid3/proxy_monitor.sh b/config/squid3/proxy_monitor.sh
index fa5a87bb..00430018 100644
--- a/config/squid3/proxy_monitor.sh
+++ b/config/squid3/proxy_monitor.sh
@@ -27,6 +27,11 @@
# POSSIBILITY OF SUCH DAMAGE.
#
+if [ `pgrep -f "proxy_monitor.sh"|wc -l` -ge 1 ]; then
+ exit 0
+fi
+
+
set -e
LOOP_SLEEP=55
diff --git a/config/varnish3/varnish.inc b/config/varnish3/varnish.inc
index ee6362d5..9d38161e 100644
--- a/config/varnish3/varnish.inc
+++ b/config/varnish3/varnish.inc
@@ -5,7 +5,7 @@
part of pfSense (http://www.pfSense.com)
Copyright (C) 2010 Scott Ullrich <sullrich@gmail.com>
Copyright (C) 2011 Marcello Coutinho
- Copyright (C) 2012 Márcio Carlos Antão
+ Copyright (C) 2012 Marcio Carlos Antao
All rights reserved.
*/
/* ========================================================================== */
@@ -154,7 +154,7 @@ function varnish_get_url_mappings_txt() {
$urlbackend = "\t\t\tset req.backend = ".$url['directorname'].";";
#check rewrite options
- $url['rewritehost']) {
+ if($url['rewritehost']) {
$urlmappings .= "\t\t\tset req.http.host = regsub(req.http.host, ".'"'.$url['directorurl'].'",'.'"'.$url['rewritehost'].'")'.";\n";
}
if ($url['rewriteurl']) {
diff --git a/config/widget-snort/snort_alerts.widget.php b/config/widget-snort/snort_alerts.widget.php
index c579a35e..6d6193d8 100644
--- a/config/widget-snort/snort_alerts.widget.php
+++ b/config/widget-snort/snort_alerts.widget.php
@@ -2,7 +2,7 @@
/*
snort_alerts.widget.php
Copyright (C) 2009 Jim Pingle
- mod 19-07-2012
+ mod 24-07-2012
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
@@ -26,68 +26,84 @@
POSSIBILITY OF SUCH DAMAGE.
*/
global $config, $g;
-$snort_alerts_title = "Snort Alerts";
-$snort_alerts_title_link = "snort/snort_alerts.php";
+
+/* array sorting */
+function sksort(&$array, $subkey="id", $sort_ascending=false) {
+ if (count($array)) {
+ $temp_array[key($array)] = array_shift($array);
+ };
+
+ foreach ($array as $key => $val){
+ $offset = 0;
+ $found = false;
+ foreach ($temp_array as $tmp_key => $tmp_val) {
+ if (!$found and strtolower($val[$subkey]) > strtolower($tmp_val[$subkey])) {
+ $temp_array = array_merge((array)array_slice($temp_array,0,$offset), array($key => $val), array_slice($temp_array,$offset));
+ $found = true;
+ };
+ $offset++;
+ };
+ if (!$found) $temp_array = array_merge($temp_array, array($key => $val));
+ };
+
+ if ($sort_ascending) {
+ $array = array_reverse($temp_array);
+ } else $array = $temp_array;
+};
+
+/* check if firewall widget variable is set */
+if (!isset($nentries)) $nentries = 5;
/* retrieve snort variables */
require_once("/usr/local/pkg/snort/snort.inc");
-
if (!is_array($config['installedpackages']['snortglobal']['rule']))
$config['installedpackages']['snortglobal']['rule'] = array();
$a_instance = &$config['installedpackages']['snortglobal']['rule'];
/* read log file(s) */
-$snort_alerts = array();
-$tmpblocked = array_flip(snort_get_blocked_ips());
+$counter=0;
foreach ($a_instance as $instanceid => $instance) {
- if ($instance['enable'] != 'on')
- continue;
+ $snort_uuid = $a_instance[$instanceid]['uuid'];
+ $if_real = snort_get_real_interface($a_instance[$instanceid]['interface']);
/* make sure alert file exists */
if (file_exists("/var/log/snort/snort_{$if_real}{$snort_uuid}/alert")) {
- $snort_uuid = $instance['uuid'];
- $if_real = snort_get_real_interface($instance['interface']);
- $tmpfile = "{$g['tmp_path']}/.widget_alert_{$snort_uuid}";
- if (isset($config['syslog']['reverse']))
- exec("tail -10 /var/log/snort/snort_{$if_real}{$snort_uuid}/alert | sort -r > {$tmpfile}");
- else
- exec("tail -10 /var/log/snort/snort_{$if_real}{$snort_uuid}/alert > {$tmpfile}");
- if (file_exists($tmpfile)) {
+ exec("tail -n{$nentries} /var/log/snort/snort_{$if_real}{$snort_uuid}/alert > /tmp/alert_{$snort_uuid}");
+ if (file_exists("/tmp/alert_{$snort_uuid}")) {
+ $tmpblocked = array_flip(snort_get_blocked_ips());
+
/* 0 1 2 3 4 5 6 7 8 9 10 11 12 */
/* File format timestamp,sig_generator,sig_id,sig_rev,msg,proto,src,srcport,dst,dstport,id,classification,priority */
- $fd = fopen($tmpfile, "r");
- while (($fileline = @fgets($fd))) {
- if (empty($fileline))
+ $fd = fopen("/tmp/alert_{$snort_uuid}", "r");
+ while (($fields = fgetcsv($fd, 1000, ',', '"')) !== FALSE) {
+ if(count($fields) < 11)
continue;
- $fields = explode(",", $fileline);
- $snort_alert = array();
- $snort_alert[]['instanceid'] = snort_get_friendly_interface($instance['interface']);
- $snort_alert[]['timestamp'] = $fields[0];
- $snort_alert[]['timeonly'] = substr($fields[0], 6, -8);
- $snort_alert[]['dateonly'] = substr($fields[0], 0, -17);
- $snort_alert[]['src'] = $fields[6];
- $snort_alert[]['srcport'] = $fields[7];
- $snort_alert[]['dst'] = $fields[8];
- $snort_alert[]['dstport'] = $fields[9];
- $snort_alert[]['priority'] = $fields[12];
- $snort_alert[]['category'] = $fields[11];
- $snort_alerts[] = $snort_alert;
- }
+ $snort_alerts[$counter]['instanceid'] = $a_instance[$instanceid]['interface'];
+ $snort_alerts[$counter]['timestamp'] = $fields[0];
+ $snort_alerts[$counter]['timeonly'] = substr($fields[0], 6, -8);
+ $snort_alerts[$counter]['dateonly'] = substr($fields[0], 0, -17);
+ $snort_alerts[$counter]['src'] = $fields[6];
+ $snort_alerts[$counter]['srcport'] = $fields[7];
+ $snort_alerts[$counter]['dst'] = $fields[8];
+ $snort_alerts[$counter]['dstport'] = $fields[9];
+ $snort_alerts[$counter]['priority'] = $fields[12];
+ $snort_alerts[$counter]['category'] = $fields[11];
+ $counter++;
+ };
fclose($fd);
- @unlink($tmpfile);
- }
- }
-}
-
-if ($_GET['evalScripts']) {
- /* AJAX specific handlers */
- $new_rules = "";
- foreach($snort_alerts as $log_row)
- $new_rules .= "{$log_row['time']}||{$log_row['priority']}||{$log_row['category']}||{$log_row['src']}||{$log_row['dst']}||{$log_row['timestamp']}||{$log_row['timeonly']}||{$log_row['dateonly']}\n";
+ @unlink("/tmp/alert_{$snort_uuid}");
+ };
+ };
+};
- echo $new_rules;
+/* sort the array */
+if (isset($config['syslog']['reverse'])) {
+ sksort($snort_alerts, 'timestamp', false);
} else {
+ sksort($snort_alerts, 'timestamp', true);
+};
+
/* display the result */
?>
<table width="100%" border="0" cellspacing="0" cellpadding="0">
@@ -98,14 +114,18 @@ if ($_GET['evalScripts']) {
<td width="40%" class="widgetsubheader">Details</td>
</tr>
<?php
-foreach ($snort_alerts as $counter => $alert) {
- echo(" <tr class='snort-alert-entry'" . $activerow . ">
- <td width='30%' class='listr'>{$alert['instanceid']}<br/>{$alert['timeonly']} {$alert['dateonly']}</td>
- <td width='40%' class='listr'>{$alert['src']}:{$alert['srcport']}<br/>{$alert['dst']}:{$alert['dstport']}</td>
- <td width='40%' class='listr'>Pri : {$alert['priority']}<br/>Cat : {$alert['category']}</td>
- </tr>");
-}
+$counter=0;
+if (is_array($snort_alerts)) {
+ foreach ($snort_alerts as $alert) {
+ echo(" <tr class='snort-alert-entry'" . $activerow . ">
+ <td width='30%' class='listr'>" . $alert['instanceid'] . "<br>" . $alert['timeonly'] . " " . $alert['dateonly'] . "</td>
+ <td width='40%' class='listr'>" . $alert['src'] . ":" . $alert['srcport'] . "<br>" . $alert['dst'] . ":" . $alert['dstport'] . "</td>
+ <td width='40%' class='listr'>Pri : " . $alert['priority'] . "<br>Cat : " . $alert['category'] . "</td>
+ </tr>");
+ $counter++;
+ if($counter >= $nentries) break;
+ }
+};
?>
</tbody>
-</table>
-<?php } ?>
+</table> \ No newline at end of file
diff --git a/pkg_config.8.xml b/pkg_config.8.xml
index 3b7ea13c..e2ac0a90 100644
--- a/pkg_config.8.xml
+++ b/pkg_config.8.xml
@@ -203,13 +203,22 @@
<build_port_path>/usr/ports/www/apache22-worker-mpm</build_port_path>
<build_port_path>/usr/ports/www/mod_security</build_port_path>
<build_port_path>/usr/ports/www/mod_memcache</build_port_path>
+ <build_port_path>/usr/ports/www/p5-LWP-Protocol-https</build_port_path>
+ <build_port_path>/usr/ports/www/p5-LWP-UserAgent-Determined</build_port_path>
+ <build_port_path>/usr/ports/security/gnupg</build_port_path>
+ <build_port_path>/user/ports/net/spread</build_port_path>
+ <build_port_path>/user/ports/textproc/p5-XML-Smart</build_port_path>
+ <build_port_path>/user/ports/lang/p5-Switch</build_port_path>
+ <build_port_path>/user/ports/www/p5-Data-Validate-URI</build_port_path>
+ <build_port_path>/user/ports/devel/p5-Data-Types</build_port_path>
+ <build_port_path>/user/ports/devel/p5-Acme-Comment</build_port_path>
<build_pbi>
<custom_name>proxy_mod_security</custom_name>
- <ports_before>devel/gettext misc/help2man databases/db42 databases/gdbm devel/apr1</ports_before>
+ <ports_before>devel/gettext misc/help2man databases/db42 databases/gdbm devel/apr1 www/p5-LWP-UserAgent-Determined www/p5-LWP-Protocol-https security/gnupg security/p5-GnuPG net/spread textproc/p5-XML-Smart lang/p5-Switch www/p5-Data-Validate-URI devel/p5-Data-Types devel/p5-Acme-Comment</ports_before>
<port>www/apache22-worker-mpm</port>
<ports_after>www/mod_security www/mod_memcache</ports_after>
</build_pbi>
- <build_options>WITH_THREADS=yes WITHOUT_MYSQL=yes WITHOUT_PGSQL=yes WITH_SQLITE=yes WITH_IPV6=yes WITHOUT_BDB=yes WITH_AUTH_BASIC=yes WITH_AUTH_DIGEST=yes WITH_AUTHN_FILE=yes WITHOUT_AUTHN_DBD=yes WITH_AUTHN_DBM=yes WITH_AUTHN_ANON=yes WITH_AUTHN_DEFAULT=yes WITH_AUTHN_ALIAS=yes WITH_AUTHZ_HOST=yes WITH_AUTHZ_GROUPFILE=yes WITH_AUTHZ_USER=yes WITH_AUTHZ_DBM=yes WITH_AUTHZ_OWNER=yes WITH_AUTHZ_DEFAULT=yes WITH_CACHE=yes WITH_DISK_CACHE=yes WITH_FILE_CACHE=yes WITH_MEM_CACHE=yes WITH_DAV=yes WITH_DAV_FS=yes WITHOUT_BUCKETEER=yes WITHOUT_CASE_FILTER=yes WITHOUT_CASE_FILTER_IN=yes WITHOUT_EXT_FILTER=yes WITHOUT_LOG_FORENSIC=yes WITHOUT_OPTIONAL_HOOK_EXPORT=yes WITHOUT_OPTIONAL_HOOK_IMPORT=yes WITHOUT_OPTIONAL_FN_IMPORT=yes WITHOUT_OPTIONAL_FN_EXPORT=yes WITHOUT_LDAP=yes WITHOUT_AUTHNZ_LDAP=yes WITH_ACTIONS=yes WITH_ALIAS=yes WITH_ASIS=yes WITH_AUTOINDEX=yes WITH_CERN_META=yes WITH_CGI=yes WITH_CHARSET_LITE=yes WITHOUT_DBD=yes WITH_DEFLATE=yes WITH_DIR=yes WITH_DUMPIO=yes WITH_ENV=yes WITH_EXPIRES=yes WITH_HEADERS=yes WITH_IMAGEMAP=yes WITH_INCLUDE=yes WITH_INFO=yes WITH_LOG_CONFIG=yes WITH_LOGIO=yes WITH_MIME=yes WITH_MIME_MAGIC=yes WITH_NEGOTIATION=yes WITH_REWRITE=yes WITH_SETENVIF=yes WITH_SPELING=yes WITH_STATUS=yes WITH_UNIQUE_ID=yes WITH_USERDIR=yes WITH_USERTRACK=yes WITH_VHOST_ALIAS=yes WITH_FILTER=yes WITHOUT_SUBSTITUTE=yes WITH_VERSION=yes WITH_PROXY=yes WITH_PROXY_CONNECT=yes WITH_PROXY_FTP=yes WITH_PROXY_HTTP=yes WITH_PROXY_AJP=yes WITH_PROXY_BALANCER=yes WITH_PROXY_SCGI=yes WITH_SSL=yes WITHOUT_SUEXEC=yes WITHOUT_SUEXEC_RSRCLIMIT=yes WITH_REQTIMEOUT=yes WITHOUT_CGID=yes</build_options>
+ <build_options>WITH_MPM=worker WITH_THREADS=yes WITHOUT_MYSQL=yes WITHOUT_PGSQL=yes WITH_SQLITE=yes WITH_IPV6=yes WITHOUT_BDB=yes WITH_AUTH_BASIC=yes WITH_AUTH_DIGEST=yes WITH_AUTHN_FILE=yes WITHOUT_AUTHN_DBD=yes WITH_AUTHN_DBM=yes WITH_AUTHN_ANON=yes WITH_AUTHN_DEFAULT=yes WITH_AUTHN_ALIAS=yes WITH_AUTHZ_HOST=yes WITH_AUTHZ_GROUPFILE=yes WITH_AUTHZ_USER=yes WITH_AUTHZ_DBM=yes WITH_AUTHZ_OWNER=yes WITH_AUTHZ_DEFAULT=yes WITH_CACHE=yes WITH_DISK_CACHE=yes WITH_FILE_CACHE=yes WITH_MEM_CACHE=yes WITH_DAV=yes WITH_DAV_FS=yes WITHOUT_BUCKETEER=yes WITHOUT_CASE_FILTER=yes WITHOUT_CASE_FILTER_IN=yes WITHOUT_EXT_FILTER=yes WITHOUT_LOG_FORENSIC=yes WITHOUT_OPTIONAL_HOOK_EXPORT=yes WITHOUT_OPTIONAL_HOOK_IMPORT=yes WITHOUT_OPTIONAL_FN_IMPORT=yes WITHOUT_OPTIONAL_FN_EXPORT=yes WITHOUT_LDAP=yes WITHOUT_AUTHNZ_LDAP=yes WITH_ACTIONS=yes WITH_ALIAS=yes WITH_ASIS=yes WITH_AUTOINDEX=yes WITH_CERN_META=yes WITH_CGI=yes WITH_CHARSET_LITE=yes WITHOUT_DBD=yes WITH_DEFLATE=yes WITH_DIR=yes WITH_DUMPIO=yes WITH_ENV=yes WITH_EXPIRES=yes WITH_HEADERS=yes WITH_IMAGEMAP=yes WITH_INCLUDE=yes WITH_INFO=yes WITH_LOG_CONFIG=yes WITH_LOGIO=yes WITH_MIME=yes WITH_MIME_MAGIC=yes WITH_NEGOTIATION=yes WITH_REWRITE=yes WITH_SETENVIF=yes WITH_SPELING=yes WITH_STATUS=yes WITH_UNIQUE_ID=yes WITH_USERDIR=yes WITH_USERTRACK=yes WITH_VHOST_ALIAS=yes WITH_FILTER=yes WITHOUT_SUBSTITUTE=yes WITH_VERSION=yes WITH_PROXY=yes WITH_PROXY_CONNECT=yes WITH_PROXY_FTP=yes WITH_PROXY_HTTP=yes WITH_PROXY_AJP=yes WITH_PROXY_BALANCER=yes WITH_PROXY_SCGI=yes WITH_SSL=yes WITHOUT_SUEXEC=yes WITHOUT_SUEXEC_RSRCLIMIT=yes WITH_REQTIMEOUT=yes WITHOUT_CGID=yes</build_options>
<after_install_info>Please visit the ProxyServer settings tab and set the service up so that it may be started.</after_install_info>
</package>
<package>
diff --git a/pkg_config.8.xml.amd64 b/pkg_config.8.xml.amd64
index 05d8ee8f..e907932f 100644
--- a/pkg_config.8.xml.amd64
+++ b/pkg_config.8.xml.amd64
@@ -190,13 +190,22 @@
<build_port_path>/usr/ports/www/apache22-worker-mpm</build_port_path>
<build_port_path>/usr/ports/www/mod_security</build_port_path>
<build_port_path>/usr/ports/www/mod_memcache</build_port_path>
+ <build_port_path>/usr/ports/www/p5-LWP-Protocol-https</build_port_path>
+ <build_port_path>/usr/ports/www/p5-LWP-UserAgent-Determined</build_port_path>
+ <build_port_path>/usr/ports/security/gnupg</build_port_path>
+ <build_port_path>/user/ports/net/spread</build_port_path>
+ <build_port_path>/user/ports/textproc/p5-XML-Smart</build_port_path>
+ <build_port_path>/user/ports/lang/p5-Switch</build_port_path>
+ <build_port_path>/user/ports/www/p5-Data-Validate-URI</build_port_path>
+ <build_port_path>/user/ports/devel/p5-Data-Types</build_port_path>
+ <build_port_path>/user/ports/devel/p5-Acme-Comment</build_port_path>
<build_pbi>
<custom_name>proxy_mod_security</custom_name>
- <ports_before>devel/gettext misc/help2man databases/db42 databases/gdbm devel/apr1</ports_before>
+ <ports_before>devel/gettext misc/help2man databases/db42 databases/gdbm devel/apr1 www/p5-LWP-UserAgent-Determined www/p5-LWP-Protocol-https security/gnupg security/p5-GnuPG net/spread textproc/p5-XML-Smart lang/p5-Switch www/p5-Data-Validate-URI devel/p5-Data-Types devel/p5-Acme-Comment</ports_before>
<port>www/apache22-worker-mpm</port>
<ports_after>www/mod_security www/mod_memcache</ports_after>
</build_pbi>
- <build_options>WITH_THREADS=yes WITHOUT_MYSQL=yes WITHOUT_PGSQL=yes WITH_SQLITE=yes WITH_IPV6=yes WITHOUT_BDB=yes WITH_AUTH_BASIC=yes WITH_AUTH_DIGEST=yes WITH_AUTHN_FILE=yes WITHOUT_AUTHN_DBD=yes WITH_AUTHN_DBM=yes WITH_AUTHN_ANON=yes WITH_AUTHN_DEFAULT=yes WITH_AUTHN_ALIAS=yes WITH_AUTHZ_HOST=yes WITH_AUTHZ_GROUPFILE=yes WITH_AUTHZ_USER=yes WITH_AUTHZ_DBM=yes WITH_AUTHZ_OWNER=yes WITH_AUTHZ_DEFAULT=yes WITH_CACHE=yes WITH_DISK_CACHE=yes WITH_FILE_CACHE=yes WITH_MEM_CACHE=yes WITH_DAV=yes WITH_DAV_FS=yes WITHOUT_BUCKETEER=yes WITHOUT_CASE_FILTER=yes WITHOUT_CASE_FILTER_IN=yes WITHOUT_EXT_FILTER=yes WITHOUT_LOG_FORENSIC=yes WITHOUT_OPTIONAL_HOOK_EXPORT=yes WITHOUT_OPTIONAL_HOOK_IMPORT=yes WITHOUT_OPTIONAL_FN_IMPORT=yes WITHOUT_OPTIONAL_FN_EXPORT=yes WITHOUT_LDAP=yes WITHOUT_AUTHNZ_LDAP=yes WITH_ACTIONS=yes WITH_ALIAS=yes WITH_ASIS=yes WITH_AUTOINDEX=yes WITH_CERN_META=yes WITH_CGI=yes WITH_CHARSET_LITE=yes WITHOUT_DBD=yes WITH_DEFLATE=yes WITH_DIR=yes WITH_DUMPIO=yes WITH_ENV=yes WITH_EXPIRES=yes WITH_HEADERS=yes WITH_IMAGEMAP=yes WITH_INCLUDE=yes WITH_INFO=yes WITH_LOG_CONFIG=yes WITH_LOGIO=yes WITH_MIME=yes WITH_MIME_MAGIC=yes WITH_NEGOTIATION=yes WITH_REWRITE=yes WITH_SETENVIF=yes WITH_SPELING=yes WITH_STATUS=yes WITH_UNIQUE_ID=yes WITH_USERDIR=yes WITH_USERTRACK=yes WITH_VHOST_ALIAS=yes WITH_FILTER=yes WITHOUT_SUBSTITUTE=yes WITH_VERSION=yes WITH_PROXY=yes WITH_PROXY_CONNECT=yes WITH_PROXY_FTP=yes WITH_PROXY_HTTP=yes WITH_PROXY_AJP=yes WITH_PROXY_BALANCER=yes WITH_PROXY_SCGI=yes WITH_SSL=yes WITHOUT_SUEXEC=yes WITHOUT_SUEXEC_RSRCLIMIT=yes WITH_REQTIMEOUT=yes WITHOUT_CGID=yes</build_options>
+ <build_options>WITH_MPM=worker WITH_THREADS=yes WITHOUT_MYSQL=yes WITHOUT_PGSQL=yes WITH_SQLITE=yes WITH_IPV6=yes WITHOUT_BDB=yes WITH_AUTH_BASIC=yes WITH_AUTH_DIGEST=yes WITH_AUTHN_FILE=yes WITHOUT_AUTHN_DBD=yes WITH_AUTHN_DBM=yes WITH_AUTHN_ANON=yes WITH_AUTHN_DEFAULT=yes WITH_AUTHN_ALIAS=yes WITH_AUTHZ_HOST=yes WITH_AUTHZ_GROUPFILE=yes WITH_AUTHZ_USER=yes WITH_AUTHZ_DBM=yes WITH_AUTHZ_OWNER=yes WITH_AUTHZ_DEFAULT=yes WITH_CACHE=yes WITH_DISK_CACHE=yes WITH_FILE_CACHE=yes WITH_MEM_CACHE=yes WITH_DAV=yes WITH_DAV_FS=yes WITHOUT_BUCKETEER=yes WITHOUT_CASE_FILTER=yes WITHOUT_CASE_FILTER_IN=yes WITHOUT_EXT_FILTER=yes WITHOUT_LOG_FORENSIC=yes WITHOUT_OPTIONAL_HOOK_EXPORT=yes WITHOUT_OPTIONAL_HOOK_IMPORT=yes WITHOUT_OPTIONAL_FN_IMPORT=yes WITHOUT_OPTIONAL_FN_EXPORT=yes WITHOUT_LDAP=yes WITHOUT_AUTHNZ_LDAP=yes WITH_ACTIONS=yes WITH_ALIAS=yes WITH_ASIS=yes WITH_AUTOINDEX=yes WITH_CERN_META=yes WITH_CGI=yes WITH_CHARSET_LITE=yes WITHOUT_DBD=yes WITH_DEFLATE=yes WITH_DIR=yes WITH_DUMPIO=yes WITH_ENV=yes WITH_EXPIRES=yes WITH_HEADERS=yes WITH_IMAGEMAP=yes WITH_INCLUDE=yes WITH_INFO=yes WITH_LOG_CONFIG=yes WITH_LOGIO=yes WITH_MIME=yes WITH_MIME_MAGIC=yes WITH_NEGOTIATION=yes WITH_REWRITE=yes WITH_SETENVIF=yes WITH_SPELING=yes WITH_STATUS=yes WITH_UNIQUE_ID=yes WITH_USERDIR=yes WITH_USERTRACK=yes WITH_VHOST_ALIAS=yes WITH_FILTER=yes WITHOUT_SUBSTITUTE=yes WITH_VERSION=yes WITH_PROXY=yes WITH_PROXY_CONNECT=yes WITH_PROXY_FTP=yes WITH_PROXY_HTTP=yes WITH_PROXY_AJP=yes WITH_PROXY_BALANCER=yes WITH_PROXY_SCGI=yes WITH_SSL=yes WITHOUT_SUEXEC=yes WITHOUT_SUEXEC_RSRCLIMIT=yes WITH_REQTIMEOUT=yes WITHOUT_CGID=yes</build_options>
<after_install_info>Please visit the ProxyServer settings tab and set the service up so that it may be started.</after_install_info>
</package>
<package>