From 8b857b14855f7639fdf7ee9e5f4eb22a7c6779aa Mon Sep 17 00:00:00 2001 From: Daniel Stefan Haischt Date: Sun, 16 Sep 2007 19:08:07 +0000 Subject: * added user manager GUI stuff * split usermanager GUI into several files to improve maintainability * added windows JavaScript files to provide eye candy to alert boxes * added initial wizard * TODO: factor out auth usermanager related logic from authng.inc to authng_usermanager.inc --- packages/authng/diff/authng-guiconfig.inc.diff | 15 +- packages/authng/pkg/authng.inc | 245 +++++++++- packages/authng/pkg/authng_classdefs.inc | 34 +- packages/authng/pkg/authng_peers.inc | 64 ++- packages/authng/pkg/authng_usermanager.inc | 247 ++++++++++ packages/authng/www/php/head.inc | 22 +- packages/authng/www/php/system_usermanager.php | 458 ++----------------- .../authng/www/php/system_usermanager_admin.inc | 92 ++++ .../www/php/system_usermanager_admin_index.inc | 108 +++++ .../www/php/system_usermanager_admin_newedit.inc | 167 +++++++ .../authng/www/php/system_usermanager_user.inc | 66 +++ packages/authng/www/wizards/authng_wizard.xml | 496 +++++++++++++++++++++ 12 files changed, 1522 insertions(+), 492 deletions(-) create mode 100644 packages/authng/pkg/authng_usermanager.inc create mode 100644 packages/authng/www/php/system_usermanager_admin.inc create mode 100644 packages/authng/www/php/system_usermanager_admin_index.inc create mode 100644 packages/authng/www/php/system_usermanager_admin_newedit.inc create mode 100644 packages/authng/www/php/system_usermanager_user.inc create mode 100644 packages/authng/www/wizards/authng_wizard.xml diff --git a/packages/authng/diff/authng-guiconfig.inc.diff b/packages/authng/diff/authng-guiconfig.inc.diff index 35b4f3aa..e65ae8b8 100644 --- a/packages/authng/diff/authng-guiconfig.inc.diff +++ b/packages/authng/diff/authng-guiconfig.inc.diff @@ -6,11 +6,22 @@ diff -u -r1.90.2.31.2.3 guiconfig.inc --- guiconfig.inc 10 May 2007 20:49:41 -0000 1.90.2.31.2.3 +++ guiconfig.inc 9 Sep 2007 19:43:31 -0000 @@ -41,7 +41,7 @@ - + /* Include authentication routines */ /* THIS MUST BE ABOVE ALL OTHER CODE */ -require_once("auth.inc"); +require_once("authng_authgui.inc"); - + /* parse the configuration and include all configuration functions */ require_once("config.inc"); +@@ -574,10 +574,6 @@ + + usort($config['shaper']['rule'], "rqpcmp"); + } +-function gentitle($pgname) { +- global $config; +- return $config['system']['hostname'] . "." . $config['system']['domain'] . " - " . $pgname; +-} + + /* update the changedesc and changecount(er) variables */ + function update_changedesc($update) { diff --git a/packages/authng/pkg/authng.inc b/packages/authng/pkg/authng.inc index 509f5a18..06774acd 100644 --- a/packages/authng/pkg/authng.inc +++ b/packages/authng/pkg/authng.inc @@ -36,8 +36,13 @@ */ /* ========================================================================== */ +/* PHP classes like factories users, and groups */ +require_once("authng_classdefs.inc"); +/* PHP classes representing specific auth methods */ require_once("authng_authmethods.inc"); +/* PHP classes representing specific backends */ require_once("authng_backends.inc"); +/* PHP peer classes that are providing a persistence layer */ require_once("authng_peers.inc"); // TODO: Define user- and groupindex array @@ -61,9 +66,242 @@ $authMethod =& $authMethodFactory->getAuthMethodByName($config['system']['webgui // get the actual backend $backend =& $backendFactory->getBackendByName($config['system']['webgui']['backing_method']); -function syncPackageAuthNG() { +function getUsermanagerPagetitle() { + global $userPeer; + + $result = ""; + + if ($userPeer->isSystemAdmin($HTTP_SERVER_VARS['AUTH_USER'])) { + // Page title for admins + $result = array(gettext("System"), gettext("User manager")); + } else { + // Page title for non-admins + $result = array(gettext("System"), gettext("User password")); + } + + return $result; +} + +function processUserManagerPostVars() { + global $input_errors, $savemsg, $config; + + if (isset($_POST['save'])) { + unset($input_errors); + + /* input validation */ + $reqdfields = explode(" ", "passwordfld1"); + $reqdfieldsn = explode(",", "Password"); + + do_input_validation($_POST, $reqdfields, $reqdfieldsn, &$input_errors); + + if ($_POST['passwordfld1'] != $_POST['passwordfld2']) + $input_errors[] = "The passwords do not match."; + + if (!$input_errors) { + // all values are okay --> saving changes + $config['system']['user'][$userindex[$HTTP_SERVER_VARS['AUTH_USER']]]['password'] = crypt(trim($_POST['passwordfld1'])); + + write_config(); + + sync_webgui_passwords(); + + $retval = system_password_configure(); + $savemsg = get_std_save_message($retval); + $savemsg = "Password successfully changed
"; + } + } +} + +function processUserManagerAdminPostVars() { + global $config; + + $id = $_GET['id']; + if (isset($_POST['id'])) + $id = $_POST['id']; + + if (!is_array($config['system']['user'])) { + $config['system']['user'] = array(); + } + + admin_users_sort(); + $a_user = &$config['system']['user']; + $t_privs = $a_user[$id]['priv']; + + if ($_GET['act'] == "del" && $_GET['what'] == "user") { + if ($a_user[$_GET['id']]) { + $userdeleted = $a_user[$_GET['id']]['name']; + unset($a_user[$_GET['id']]); + write_config(); + $retval = system_password_configure(); + $savemsg = get_std_save_message($retval); + $savemsg = gettext("User") . " " . $userdeleted . " " . gettext("successfully deleted") . "
"; + } + } else if ($_GET['act'] == "del" && $_GET['what'] == "priv") { + if ($t_privs[$_GET['privid']]) { + $privdeleted = $t_privs[$_GET['privid']]['id']; + unset($t_privs[$_GET['privid']]); + write_config(); + $_GET['act'] = "edit"; + $retval = 0; + $savemsg = get_std_save_message($retval); + $savemsg = gettext("Privilege") . " " . $privdeleted . " " . gettext("of user") . " " . $a_user[$_GET['id']]['name'] . " " . gettext("successfully deleted") . "
"; + } + } + + if ($_POST) { + unset($input_errors); + $pconfig = $_POST; + + /* input validation */ + if (isset($id) && ($a_user[$id])) { + $reqdfields = explode(" ", "usernamefld"); + $reqdfieldsn = explode(",", "Username"); + } else { + $reqdfields = explode(" ", "usernamefld passwordfld1"); + $reqdfieldsn = explode(",", "Username,Password"); + } + + do_input_validation($_POST, $reqdfields, $reqdfieldsn, &$input_errors); + + if (hasShellAccess($_POST['usernamefld'])) { + if (preg_match("/[^a-zA-Z0-9\.\-_]/", $_POST['usernamefld'])) + $input_errors[] = gettext("The username contains invalid characters."); + } else { + if (preg_match("/[^a-zA-Z0-9\@\.\-_]/", $_POST['usernamefld'])) + $input_errors[] = gettext("The username contains invalid characters."); + } + + if (($_POST['passwordfld1']) && ($_POST['passwordfld1'] != $_POST['passwordfld2'])) + $input_errors[] = gettext("The passwords do not match."); + + if (!$input_errors && !(isset($id) && $a_user[$id])) { + /* make sure there are no dupes */ + foreach ($a_user as $userent) { + if ($userent['name'] == $_POST['usernamefld']) { + $input_errors[] = gettext("Another entry with the same username already exists."); + break; + } + } + } + + if ($pconfig['utype'] <> "system" && !isset($groupindex[$_POST['groupname']])) { + $input_errors[] = gettext("group does not exist, please define the group before assigning users."); + } + + if (isset($config['system']['ssh']['sshdkeyonly']) && + empty($_POST['authorizedkeys'])) { + $input_errors[] = gettext("You must provide an authorized key otherwise you won't be able to login into this system."); + } + + /* if this is an AJAX caller then handle via JSON */ + if (isAjax() && is_array($input_errors)) { + input_errors2Ajax($input_errors); + exit; + } + + if (!$input_errors) { + if (isset($id) && $a_user[$id]) + $userent = $a_user[$id]; + + /* the user did change his username */ + if ($_POST['usernamefld'] <> $_POST['oldusername']) { + $_SERVER['REMOTE_USER'] = $_POST['usernamefld']; + } + + $userent['name'] = $_POST['usernamefld']; + $userent['fullname'] = $_POST['fullname']; + if ($pconfig['utype'] <> "system") { + $userent['groupname'] = $_POST['groupname']; + } + isset($_POST['utype']) ? $userent['scope'] = $_POST['utype'] : $userent['scope'] = "system"; + + if ($_POST['passwordfld1']) + $userent['password'] = crypt($_POST['passwordfld1']); + + if(isset($config['system']['ssh']['sshdkeyonly'])) { + $userent['authorizedkeys'] = base64_encode($_POST['authorizedkeys']); + } + + if (isset($id) && $a_user[$id]) + $a_user[$id] = $userent; + else + $a_user[] = $userent; + + write_config(); + $retval = system_password_configure(); + sync_webgui_passwords(); + + pfSenseHeader("system_usermanager.php"); + } + } +} + +/** + * getWindowJSScriptRefs() + * + * @return + */ +function getWindowJSScriptRefs(){ + $result = array('', + '', + ''); + + return $result; +} + +function gotNoUsers() { + global $config; + return empty($config['installedpackages']['authng']['config']); +} + +/** + * openNoUserDefsDialog() + * + * @param mixed $effectClass + * @return + */ +function openNoUserDefsDialog($effectClass) { + if (gotNoUsers()) { + $alertMessage = gettext("No users or groups found. You will be forwarded to the AuthNG wizard to be able to define users and groups."); + $dialogScript = " + + "; + + return $dialogScript; + } +} + +/** + * getWindowJSStyleRefs() + * + * @return + */ +function getWindowJSStyleRefs(){ + $result = array('', + '', + ''); + + return $result; } +/** + * installPackageAuthNG() + * + * @return + */ function installPackageAuthNG() { mwexec("cd / && /usr/bin/patch < /usr/local/pkg/authng-pfSenseHead.diff"); mwexec("cd / && /usr/bin/patch < /usr/local/pkg/authng-fbegin.inc.diff"); @@ -71,6 +309,11 @@ function installPackageAuthNG() { mwexec("cd / && /usr/bin/patch < /usr/local/pkg/authng-globals.inc.diff"); } +/** + * deinstallPackageAuthNG() + * + * @return + */ function deinstallPackageAuthNG() { mwexec("cd / && /usr/bin/patch -R < /usr/local/pkg/authng-pfSenseHead.diff"); mwexec("cd / && /usr/bin/patch -R < /usr/local/pkg/authng-fbegin.inc.diff"); diff --git a/packages/authng/pkg/authng_classdefs.inc b/packages/authng/pkg/authng_classdefs.inc index 7315bb6f..64f0ff14 100644 --- a/packages/authng/pkg/authng_classdefs.inc +++ b/packages/authng/pkg/authng_classdefs.inc @@ -67,19 +67,19 @@ class SingletonInterface extends Object { } } -class AuthMethodFactory extends SingletonInterface { +class BackendFactory extends SingletonInterface { function __construct() { // Perform object initialization here. parent::__construct(); } function &getInstance() { - return parent::__getInstanceImp('AuthMethodFactory'); + return parent::__getInstanceImp('BackendFactory'); } - - function &getAuthMethodByName($name) { + + function &getBackendByName($name) { $result = null; - + /* Each name links to an entry in config.xml * Example: session */ @@ -101,24 +101,24 @@ class AuthMethodFactory extends SingletonInterface { break; default: } - + return $result; } } -class BackendFactory extends SingletonInterface { +class AuthMethodFactory extends SingletonInterface { function __construct() { // Perform object initialization here. parent::__construct(); } function &getInstance() { - return parent::__getInstanceImp('BackendFactory'); + return parent::__getInstanceImp('AuthMethodFactory'); } - - function &getBackendByName($name) { + + function &getAuthMethodByName($name) { $result = null; - + /* Each name links to an entry in config.xml * Example: htpasswd */ @@ -131,7 +131,7 @@ class BackendFactory extends SingletonInterface { break; default: } - + return $result; } } @@ -154,7 +154,7 @@ class AuthngAuxiliary { return $adminUsers; } // end function - + function assignUID($username = "") { global $userindex, $config, $g; @@ -323,19 +323,19 @@ class AuthngUser { /* ========================================================================== */ /* == Accessors == */ /* ========================================================================== */ - + function isSystemAdmin() { return $this->systemAdmin; } - + function setIsSystemAdmin($flag = false) { $this->systemAdmin = $flag; } - + function isUNIXRoot() { return $this->unixRoot; } - + function setIsUNIXRoot($flag = false) { $this->unixRoot = $flag; } diff --git a/packages/authng/pkg/authng_peers.inc b/packages/authng/pkg/authng_peers.inc index e1640edc..bce3c494 100644 --- a/packages/authng/pkg/authng_peers.inc +++ b/packages/authng/pkg/authng_peers.inc @@ -36,8 +36,6 @@ */ /* ========================================================================== */ -require_once("authng_classdefs.inc"); - class PeerFactory extends SingletonInterface { function __construct() { // Perform object initialization here. @@ -47,10 +45,10 @@ class PeerFactory extends SingletonInterface { function &getInstance() { return parent::__getInstanceImp('PeerFactory'); } - + function &getGroupPeerByPrincipalStore($store) { $result = null; - + /* Each name links to an entry in config.xml * Example: xml */ @@ -66,13 +64,13 @@ class PeerFactory extends SingletonInterface { break; default: } - + return $result; } - + function &getUserPeerByPrincipalStore($store) { $result = null; - + /* Each name links to an entry in config.xml * Example: xml */ @@ -88,7 +86,7 @@ class PeerFactory extends SingletonInterface { break; default: } - + return $result; } } @@ -116,11 +114,11 @@ class AbstractPrivilegePeer { /* ========================================================================== */ /* == Accessors == */ /* ========================================================================== */ - + function setUserPeer($peer) { $this->userPeer = $peer; } - + function getUserPeer() { return $this->userPeer; } @@ -194,19 +192,19 @@ class AbstractUserPeer { function getUserByIndex($index) { return $this->users[$index]; } - + function getUserByName($username) { return $this->users[$username]; } - + function isSystemAdmin($username) { $result = false; $user = $this->getUserByName($username); - + if ($user) { $result = $user->isSystemAdmin(); } - + return $result; } } @@ -245,19 +243,19 @@ class AbstractGroupPeer { function getGroupByIndex($index) { return $this->groups[$index]; } - + function getGroupByName($groupname) { return $this->groups[$groupname]; } - + function getGroupHomePage($groupname) { $result = false; $group = $this->getGroupByName($groupname); - + if ($group) { $result = $group->getHome(); } - + return $result; } } @@ -276,11 +274,11 @@ class XMLPrivilegePeer extends AbstractPrivilegePeer { function XMLPrivilegePeer($userPeer) { global $g, $config; - + parent::AbstractPrivilegePeer(); - + $this->setUserPeer($peer); - + foreach ($peer->users as $userent) { foreach ($userent->getPrivileges() as $privent) { $this->privileges[$userent->getName()] = $privent; @@ -311,22 +309,22 @@ class XMLPrivilegePeer extends AbstractPrivilegePeer { $userid = getPrivilegeIndexByName($username); $user = $config['system']['user'][$userid]; } - + function setFullName($id, $name) { $userid = getUserIndexByName($id); $config['system']['user'][$userid]['fullname'] = $name; } - + function setGroupName($id, $name) { $userid = getUserIndexByName($id); $config['system']['user'][$userid]['groupname'] = $name; } - + function setPassword($id, $pwd) { $userid = getUserIndexByName($id); $config['system']['user'][$userid]['password'] = $pwd; } - + function setUid($id, $uid) { $userid = getUserIndexByName($id); $config['system']['user'][$userid]['uid'] = $uid; @@ -347,7 +345,7 @@ class XMLUserPeer extends AbstractUserPeer { function XMLUserPeer() { global $g, $config; - + parent::AbstractUserPeer(); if (isset($config['system']['user'])) { @@ -358,7 +356,7 @@ class XMLUserPeer extends AbstractUserPeer { $this->addUserFromEnt($userent); $i++; } - } + } } /* ========================================================================== */ @@ -384,7 +382,7 @@ class XMLUserPeer extends AbstractUserPeer { $newPrivilege->setId($privent['id']); $newPrivilege->setName($privent['name']); $newPrivilege->setDescription($privent['description']); - + $newUser->addPrivilege($newPrivilege); } } @@ -396,22 +394,22 @@ class XMLUserPeer extends AbstractUserPeer { $userid = getUserIndexByName($id); $config['system']['user'][$userid]['name'] = $name; } - + function setFullName($id, $name) { $userid = getUserIndexByName($id); $config['system']['user'][$userid]['fullname'] = $name; } - + function setGroupName($id, $name) { $userid = getUserIndexByName($id); $config['system']['user'][$userid]['groupname'] = $name; } - + function setPassword($id, $pwd) { $userid = getUserIndexByName($id); $config['system']['user'][$userid]['password'] = $pwd; } - + function setUid($id, $uid) { $userid = getUserIndexByName($id); $config['system']['user'][$userid]['uid'] = $uid; @@ -432,7 +430,7 @@ class XMLGroupPeer extends AbstractGroupPeer { function XMLGroupPeer() { global $g, $config; - + parent::AbstractGroupPeer(); if (isset($config['system']['group'])) { diff --git a/packages/authng/pkg/authng_usermanager.inc b/packages/authng/pkg/authng_usermanager.inc new file mode 100644 index 00000000..f96759fb --- /dev/null +++ b/packages/authng/pkg/authng_usermanager.inc @@ -0,0 +1,247 @@ + + All rights reserved. + + Based on m0n0wall (http://m0n0.ch/wall) + Copyright (C) 2003-2006 Manuel Kasper . + All rights reserved. + */ +/* ========================================================================== */ +/* + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + + THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, + INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY + AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, + OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + POSSIBILITY OF SUCH DAMAGE. + */ +/* ========================================================================== */ + +function initUserFromGetVars() { + if ($_GET['act'] == "edit") { + if (isset($id) && $a_user[$id]) { + $pconfig['usernamefld'] = $a_user[$id]['name']; + $pconfig['fullname'] = $a_user[$id]['fullname']; + $pconfig['groupname'] = $a_user[$id]['groupname']; + $pconfig['utype'] = $a_user[$id]['scope']; + $pconfig['authorizedkeys'] = base64_decode($a_user[$id]['authorizedkeys']); + } + } else if ($_GET['act'] == "new") { + /* set this value cause the text field is read only + * and the user should not be able to mess with this + * setting. + */ + $pconfig['utype'] = "user"; + } +} +function processUserManagerPostVarsUser() { + if (isset($_POST['save'])) { + unset($input_errors); + + /* input validation */ + $reqdfields = explode(" ", "passwordfld1"); + $reqdfieldsn = explode(",", "Password"); + + do_input_validation($_POST, $reqdfields, $reqdfieldsn, &$input_errors); + + if ($_POST['passwordfld1'] != $_POST['passwordfld2']) + $input_errors[] = "The passwords do not match."; + + if (!$input_errors) { + // all values are okay --> saving changes + $config['system']['user'][$userindex[$HTTP_SERVER_VARS['AUTH_USER']]]['password'] = crypt(trim($_POST['passwordfld1'])); + + write_config(); + + sync_webgui_passwords(); + + $retval = system_password_configure(); + $savemsg = get_std_save_message($retval); + $savemsg = "Password successfully changed
"; + } + } +} + +function processUserManagerPostVarsAdmin() { + $id = $_GET['id']; + if (isset($_POST['id'])) + $id = $_POST['id']; + + if (!is_array($config['system']['user'])) { + $config['system']['user'] = array(); + } + + admin_users_sort(); + $a_user = &$config['system']['user']; + $t_privs = $a_user[$id]['priv']; + + if ($_GET['act'] == "del" && $_GET['what'] == "user") { + if ($a_user[$_GET['id']]) { + $userdeleted = $a_user[$_GET['id']]['name']; + unset($a_user[$_GET['id']]); + write_config(); + $retval = system_password_configure(); + $savemsg = get_std_save_message($retval); + $savemsg = gettext("User") . " " . $userdeleted . " " . gettext("successfully deleted") . "
"; + } + } else if ($_GET['act'] == "del" && $_GET['what'] == "priv") { + if ($t_privs[$_GET['privid']]) { + $privdeleted = $t_privs[$_GET['privid']]['id']; + unset($t_privs[$_GET['privid']]); + write_config(); + $_GET['act'] = "edit"; + $retval = 0; + $savemsg = get_std_save_message($retval); + $savemsg = gettext("Privilege") . " " . $privdeleted . " " . gettext("of user") . " " . $a_user[$_GET['id']]['name'] . " " . gettext("successfully deleted") . "
"; + } + } + + if ($_POST) { + unset($input_errors); + $pconfig = $_POST; + + /* input validation */ + if (isset($id) && ($a_user[$id])) { + $reqdfields = explode(" ", "usernamefld"); + $reqdfieldsn = explode(",", "Username"); + } else { + $reqdfields = explode(" ", "usernamefld passwordfld1"); + $reqdfieldsn = explode(",", "Username,Password"); + } + + do_input_validation($_POST, $reqdfields, $reqdfieldsn, &$input_errors); + + if (hasShellAccess($_POST['usernamefld'])) { + if (preg_match("/[^a-zA-Z0-9\.\-_]/", $_POST['usernamefld'])) + $input_errors[] = gettext("The username contains invalid characters."); + } else { + if (preg_match("/[^a-zA-Z0-9\@\.\-_]/", $_POST['usernamefld'])) + $input_errors[] = gettext("The username contains invalid characters."); + } + + if (($_POST['passwordfld1']) && ($_POST['passwordfld1'] != $_POST['passwordfld2'])) + $input_errors[] = gettext("The passwords do not match."); + + if (!$input_errors && !(isset($id) && $a_user[$id])) { + /* make sure there are no dupes */ + foreach ($a_user as $userent) { + if ($userent['name'] == $_POST['usernamefld']) { + $input_errors[] = gettext("Another entry with the same username already exists."); + break; + } + } + } + + if ($pconfig['utype'] <> "system" && !isset($groupindex[$_POST['groupname']])) { + $input_errors[] = gettext("group does not exist, please define the group before assigning users."); + } + + if (isset($config['system']['ssh']['sshdkeyonly']) && + empty($_POST['authorizedkeys'])) { + $input_errors[] = gettext("You must provide an authorized key otherwise you won't be able to login into this system."); + } + + /* if this is an AJAX caller then handle via JSON */ + if (isAjax() && is_array($input_errors)) { + input_errors2Ajax($input_errors); + exit; + } + + if (!$input_errors) { + if (isset($id) && $a_user[$id]) + $userent = $a_user[$id]; + + /* the user did change his username */ + if ($_POST['usernamefld'] <> $_POST['oldusername']) { + $_SERVER['REMOTE_USER'] = $_POST['usernamefld']; + } + + $userent['name'] = $_POST['usernamefld']; + $userent['fullname'] = $_POST['fullname']; + if ($pconfig['utype'] <> "system") { + $userent['groupname'] = $_POST['groupname']; + } + isset($_POST['utype']) ? $userent['scope'] = $_POST['utype'] : $userent['scope'] = "system"; + + if ($_POST['passwordfld1']) + $userent['password'] = crypt($_POST['passwordfld1']); + + if(isset($config['system']['ssh']['sshdkeyonly'])) { + $userent['authorizedkeys'] = base64_encode($_POST['authorizedkeys']); + } + + if (isset($id) && $a_user[$id]) + $a_user[$id] = $userent; + else + $a_user[] = $userent; + + write_config(); + $retval = system_password_configure(); + sync_webgui_passwords(); + + pfSenseHeader("system_usermanager.php"); + } + } +} + +/** + * getWindowJSScriptRefs() + * + * @return + */ +function getWindowJSScriptRefs(){ + $result = array('', + '', + '', + '', + ''); + + return $result; +} + +/** + * openNoUserDefsDialog() + * + * @param mixed $effectClass + * @return + */ +function openNoUserDefsDialog($effectClass) { + if (empty($config['installedpackages']['authng']['config'])) { + $alertMessage = gettext("No users or group found. You will be forwarded to the AuthNG wizard to be able to define users and groups."); + $dialogScript = " + + "; + + return $dialogScript; + } +} + +?> \ No newline at end of file diff --git a/packages/authng/www/php/head.inc b/packages/authng/www/php/head.inc index dbbf7a49..5365c715 100644 --- a/packages/authng/www/php/head.inc +++ b/packages/authng/www/php/head.inc @@ -49,15 +49,15 @@ if($config['theme'] <> "") { // navigation level separator string $navlevelsep = ": "; -//function gentitle($title) { -// global $navlevelsep; -// -// if(!is_array($title)) { -// return $title; -// } -// -// return join($navlevelsep, $title); -//} +function gentitle($title) { + global $navlevelsep; + + if(!is_array($title)) { + return $title; + } + + return join($navlevelsep, $title); +} function genhtmltitle($title) { global $config; @@ -228,7 +228,7 @@ class pfSenseHTMLHead var $link = array(); var $script = array(); var $style = array(); - var $html = "\n\n%TITLE%\n%META%\n%STYLE%\n%LINK%\n%SCRIPT%"; + var $html = "\n\n%TITLE%\n%META%\n%STYLE%\n%LINK%\n%SCRIPT%"; var $closehead = true; var $returnedHTML = false; var $allCSSID = "NOT-SET"; @@ -639,7 +639,7 @@ class pfSenseHTMLHead $this->html = str_replace("%STYLE%", $stylestr, $this->html); $this->html = str_replace("%LINK%", $linkstr, $this->html); $this->html = str_replace("%SCRIPT%", $scriptstr, $this->html); - $this->html = str_replace("%LANG%", $language, $this->html); + //$this->html = str_replace("%LANG%", $language, $this->html); $this->html = $this->xmlHead . $this->docType . $this->html; $this->returnedHTML = true; diff --git a/packages/authng/www/php/system_usermanager.php b/packages/authng/www/php/system_usermanager.php index 1af4bdc3..0a13be95 100644 --- a/packages/authng/www/php/system_usermanager.php +++ b/packages/authng/www/php/system_usermanager.php @@ -38,445 +38,47 @@ require("guiconfig.inc"); // The page title for non-admins -$pgtitle = array(gettext("System"), gettext("User password")); +$pgtitle = getUsermanagerPagetitle(); -if ($userPeer->isSystemAdmin($HTTP_SERVER_VARS['AUTH_USER'])) { - // Page title for main admin - $pgtitle = array(gettext("System"), gettext("User manager")); +include("head.inc"); - $id = $_GET['id']; - if (isset($_POST['id'])) - $id = $_POST['id']; - - if (!is_array($config['system']['user'])) { - $config['system']['user'] = array(); - } - - admin_users_sort(); - $a_user = &$config['system']['user']; - $t_privs = $a_user[$id]['priv']; - - if ($_GET['act'] == "del" && $_GET['what'] == "user") { - if ($a_user[$_GET['id']]) { - $userdeleted = $a_user[$_GET['id']]['name']; - unset($a_user[$_GET['id']]); - write_config(); - $retval = system_password_configure(); - $savemsg = get_std_save_message($retval); - $savemsg = gettext("User") . " " . $userdeleted . " " . gettext("successfully deleted") . "
"; - } - } else if ($_GET['act'] == "del" && $_GET['what'] == "priv") { - if ($t_privs[$_GET['privid']]) { - $privdeleted = $t_privs[$_GET['privid']]['id']; - unset($t_privs[$_GET['privid']]); - write_config(); - $_GET['act'] = "edit"; - $retval = 0; - $savemsg = get_std_save_message($retval); - $savemsg = gettext("Privilege") . " " . $privdeleted . " " . gettext("of user") . " " . $a_user[$_GET['id']]['name'] . " " . gettext("successfully deleted") . "
"; - } - } - - if ($_POST) { - unset($input_errors); - $pconfig = $_POST; - - /* input validation */ - if (isset($id) && ($a_user[$id])) { - $reqdfields = explode(" ", "usernamefld"); - $reqdfieldsn = explode(",", "Username"); - } else { - $reqdfields = explode(" ", "usernamefld passwordfld1"); - $reqdfieldsn = explode(",", "Username,Password"); - } - - do_input_validation($_POST, $reqdfields, $reqdfieldsn, &$input_errors); - - if (hasShellAccess($_POST['usernamefld'])) { - if (preg_match("/[^a-zA-Z0-9\.\-_]/", $_POST['usernamefld'])) - $input_errors[] = gettext("The username contains invalid characters."); - } else { - if (preg_match("/[^a-zA-Z0-9\@\.\-_]/", $_POST['usernamefld'])) - $input_errors[] = gettext("The username contains invalid characters."); - } - - if (($_POST['passwordfld1']) && ($_POST['passwordfld1'] != $_POST['passwordfld2'])) - $input_errors[] = gettext("The passwords do not match."); - - if (!$input_errors && !(isset($id) && $a_user[$id])) { - /* make sure there are no dupes */ - foreach ($a_user as $userent) { - if ($userent['name'] == $_POST['usernamefld']) { - $input_errors[] = gettext("Another entry with the same username already exists."); - break; - } - } +$effectStyle = ' + +'; +foreach(getWindowJSScriptRefs() as $jscript){ + $pfSenseHead->addScript($jscript); +} +foreach(getWindowJSStyleRefs() as $style){ + $pfSenseHead->addStyle($style); +} +$pfSenseHead->addStyle($effectStyle); +echo $pfSenseHead->getHTML(); ?> - -"> + +

+
- - - - - - - -
- -
- - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- /> - -
- -
-   -
- /> -
- -
- -
- -
- - - - - - - - - - - ""): ?> - - - - - - - - - - - - - - - - -
> - - > - - > -   - - - - - - - -
')">
- -
- - - - -
-
-
- -
- -
- -
- -
  - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - -
UsernameFull nameGroup
- - - - - -
- - User - - User - -   - - -
-
  -   - - - edit user - - -   - ')"> - delete user - - -
- - add user - -
-

- -

-

- -

-
- -
saving changes - $config['system']['user'][$userindex[$HTTP_SERVER_VARS['AUTH_USER']]]['password'] = crypt(trim($_POST['passwordfld1'])); - - write_config(); - - sync_webgui_passwords(); - - $retval = system_password_configure(); - $savemsg = get_std_save_message($retval); - $savemsg = "Password successfully changed
"; + if (! gotNoUsers()) { + if ($userPeer->isSystemAdmin($HTTP_SERVER_VARS['AUTH_USER'])) { + processUserManagerAdminPostVars(); + require_once("system_usermanager_admin.inc"); + } else { + processUserManagerPostVars(); + require_once("system_usermanager_user.inc"); } } ?> - -getHTML(); -?> - - - - "> -
- - - - - - - - - - - - - - - -
's Password
Password - -
- -   -
- -
  - " /> -
-
- - + +
 
+ diff --git a/packages/authng/www/php/system_usermanager_admin.inc b/packages/authng/www/php/system_usermanager_admin.inc new file mode 100644 index 00000000..73cda74f --- /dev/null +++ b/packages/authng/www/php/system_usermanager_admin.inc @@ -0,0 +1,92 @@ + + All rights reserved. + + Based on m0n0wall (http://m0n0.ch/wall) + Copyright (C) 2003-2006 Manuel Kasper . + All rights reserved. + */ +/* ========================================================================== */ +/* + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + + THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, + INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY + AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, + OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + POSSIBILITY OF SUCH DAMAGE. + */ +/* ========================================================================== */ +/* ======================= P A G E F R A G M E N T ======================== */ +/* ========================================================================== */ +?> + + + + + + + +
+ +
+
+ + + + +
+ + + +
+
+
diff --git a/packages/authng/www/php/system_usermanager_admin_index.inc b/packages/authng/www/php/system_usermanager_admin_index.inc new file mode 100644 index 00000000..807c7e53 --- /dev/null +++ b/packages/authng/www/php/system_usermanager_admin_index.inc @@ -0,0 +1,108 @@ + + All rights reserved. + + Based on m0n0wall (http://m0n0.ch/wall) + Copyright (C) 2003-2006 Manuel Kasper . + All rights reserved. + */ +/* ========================================================================== */ +/* + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + + THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, + INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY + AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, + OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + POSSIBILITY OF SUCH DAMAGE. + */ +/* ========================================================================== */ +/* ======================= P A G E F R A G M E N T ======================== */ +/* ========================================================================== */ +?> + + + + + + + + + + + + + + + + + + + + + + +
UsernameFull nameGroup
+ + + + + +
+ + User + + User + +   + + +
+
  +   + + + edit user + + +   + ')"> + delete user + + +
+ + add user + +
+

+ +

+

+ +

+
\ No newline at end of file diff --git a/packages/authng/www/php/system_usermanager_admin_newedit.inc b/packages/authng/www/php/system_usermanager_admin_newedit.inc new file mode 100644 index 00000000..d5b7126d --- /dev/null +++ b/packages/authng/www/php/system_usermanager_admin_newedit.inc @@ -0,0 +1,167 @@ + + All rights reserved. + + Based on m0n0wall (http://m0n0.ch/wall) + Copyright (C) 2003-2006 Manuel Kasper . + All rights reserved. + */ +/* ========================================================================== */ +/* + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + + THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, + INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY + AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, + OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + POSSIBILITY OF SUCH DAMAGE. + */ +/* ========================================================================== */ +/* ======================= P A G E F R A G M E N T ======================== */ +/* ========================================================================== */ +?> + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+ /> + +
+ +
+   +
+ /> +
+ +
+ +
+ +
+ + + + + + + + + + + ""): ?> + + + + + + + + + + + + + + + + +
> + + > + + > +   + + + + + + + +
')">
+ +
+ + + + +
+
+
+ +
+ +
+ +
+ +
  + + + + +
diff --git a/packages/authng/www/php/system_usermanager_user.inc b/packages/authng/www/php/system_usermanager_user.inc new file mode 100644 index 00000000..25d2e210 --- /dev/null +++ b/packages/authng/www/php/system_usermanager_user.inc @@ -0,0 +1,66 @@ + + All rights reserved. + + Based on m0n0wall (http://m0n0.ch/wall) + Copyright (C) 2003-2006 Manuel Kasper . + All rights reserved. + */ +/* ========================================================================== */ +/* + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + + THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, + INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY + AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, + OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + POSSIBILITY OF SUCH DAMAGE. + */ +/* ========================================================================== */ +/* ======================= P A G E F R A G M E N T ======================== */ +/* ========================================================================== */ +?> +
+ + + + + + + + + + + + + + + +
's Password
Password + +
+ +   +
+ +
  + " /> +
diff --git a/packages/authng/www/wizards/authng_wizard.xml b/packages/authng/www/wizards/authng_wizard.xml new file mode 100644 index 00000000..94796e2f --- /dev/null +++ b/packages/authng/www/wizards/authng_wizard.xml @@ -0,0 +1,496 @@ + + + +/* $Id$ */ +/* ========================================================================== */ +/* + authng_wizard.xml + part of pfSense (http://www.pfSense.com) + Copyright (C) 2007 Daniel S. Haischt + All rights reserved. + + Based on m0n0wall (http://m0n0.ch/wall) + Copyright (C) 2003-2006 Manuel Kasper . + All rights reserved. + */ +/* ========================================================================== */ +/* + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + + THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, + INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY + AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, + OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + POSSIBILITY OF SUCH DAMAGE. + */ +/* ========================================================================== */ + +8 + + 1 + pfSense AuthNG Wizard + true + + This wizard will guide you through the initial configuration of + the pfSense authentication system. + + + + Next + submit + + + + + 2 + pfSense Backend settings + + On this screen you will define where to define pfSense users and groups + + + + PrincipalStore + select + true + installedpackages->authng->config->principal_store + + + + + + + + Backend + select + true + installedpackages->authng->config->backend + + + + + + + + + + AuthenticationMethod + select + true + installedpackages->authng->config->auth_method + + + + + + + + 3 + Time Server Information + Please enter the time, date and time zone. + + + Time server dns name + Enter the name of the time server. + input + system->timeservers + + + Timezone + timezone_select + system->timezone + + + Next + submit + + + + + 4 + true + Configure WAN Interface + On this screen we will configure the Wide Area Network information. + + var selectedItem = 0; + if(document.forms[0].ipaddress.value == 'dhcp') { + selectedItem = 1; + document.forms[0].ipaddress.value = ''; + } else if(document.forms[0].ipaddress.value == 'PPPoE') { + selectedItem = 2; + document.forms[0].ipaddress.value = ''; + } else if(document.forms[0].ipaddress.value == 'PPTP') { + selectedItem = 3; + document.forms[0].ipaddress.value = ''; + } else if(document.forms[0].ipaddress.value == 'BigPond') { + selectedItem = 4; + document.forms[0].ipaddress.value = ''; + } else { + selectedItem = 0; + } + document.forms[0].selectedtype.selectedIndex = selectedItem; + enableitems(selectedItem); + + + + SelectedType + select + true + + + + + + + + + + General configuration + listtopic + + + true + MAC Address + interfaces->wan->spoofmac + input + This field can be used to modify ("spoof") the MAC address of the WAN interface (may be required with some cable connections) Enter a MAC address in the following format: xx:xx:xx:xx:xx:xx or leave blank + + + true + MTU + input + interfaces->wan->mtu + If you enter a value in this field, then MSS clamping for TCP connections to the value entered above minus 40 (TCP/IP header size) will be in effect. If you leave this field blank, an MTU of 1492 bytes for PPPoE and 1500 bytes for all other connection types will be assumed. + + + Static IP Configuration + listtopic + + + IP Address + interfaces->wan->ipaddr + input + / + true + + + true + true + true + Subnet Mask + interfaces->wan->subnet + subnet_select + + + Gateway + interfaces->wan->gateway + input + + + DHCP client configuration + listtopic + + + DHCP Hostname + input + interfaces->wan->dhcphostname + The value in this field is sent as the DHCP client identifier and hostname when requesting a DHCP lease. Some ISPs may require this (for client identification). + + + PPPoE configuration + listtopic + + + PPPoE Username + input + pppoe->username + + + PPPoE Password + input + pppoe->password + + + PPPoE Service name + input + Hint: this field can usually be left empty + + + PPPoE Dial on demand + Enable Dial-On-Demand mode + checkbox + This option causes the interface to operate in dial-on-demand mode, allowing you to have a virtual full time connection. The interface is configured, but the actual connection of the link is delayed until qualifying outgoing traffic is detected. + + + PPPoE Idle timeout + input + If no qualifying outgoing packets are transmitted for the specified number of seconds, the connection is brought down. An idle timeout of zero disables this feature. + + + PPTP configuration + listtopic + + + PPTP Username + input + pptp->username + + + PPTP Password + input + pptp->password + + + true + PPTP Local IP Address + input + / + pptp->local + + + true + true + true + pptplocalsubnet + pptp->subnet + subnet_select + + + PPTP Remote IP Address + pptp->remote + input + + + PPTP Dial on demand + Enable Dial-On-Demand mode + checkbox + This option causes the interface to operate in dial-on-demand mode, allowing you to have a virtual full time connection. The interface is configured, but the actual connection of the link is delayed until qualifying outgoing traffic is detected. + + + PPTP Idle timeout + input + If no qualifying outgoing packets are transmitted for the specified number of seconds, the connection is brought down. An idle timeout of zero disables this feature. + + + BigPond configuration + listtopic + + + BigPond Username + input + bigpond->username + + + BigPond Password + input + bigpond->password + + + BigPond Authentication server + input + bigpond->authserver + If this field is left empty, the default ("dce-server") is used. + + + BigPond Authentication domain + input + bigpond->authdomain + If this field is left empty, the domain name assigned via DHCP will be used. Note: the BigPond client implicitly sets the "Allow DNS server list to be overridden by DHCP/PPP on WAN" on the System: General setup page. + + + BigPond min heartbeat interval + input + seconds + bigpond->minheartbeatinterval + Setting this to a sensible value (e.g. 60 seconds) can protect against DoS attacks. + + + RFC1918 Networks + listtopic + + + true + Block RFC1918 Private Networks + When set, this option blocks traffic from IP addresses that are reserved for private networks as per RFC 1918 (10/8, 172.16/12, 192.168/16) as well as loopback addresses (127/8). You should generally leave this option turned on, unless your WAN network lies in such a private address space, too. + checkbox + interfaces->wan->blockpriv + Block private networks from entering via WAN + + + Block bogon networks + listtopic + + + true + Block bogon networks + Block bogon networks when set, this option blocks traffic from IP addresses that are reserved (but not RFC 1918) or not yet assigned by IANA. Bogons are prefixes that should never appear in the Internet routing table, and obviously should not appear as the source address in any packets you receive. + checkbox + interfaces->wan->blockbogons + Block non-Internet routed networks from entering via WAN + + + Next + submit + + + + if($_POST['selectedtype'] == "Static") { } else { + $_POST['ipaddress'] = $_POST['selectedtype']; + $config['interfaces']['wan']['ipaddr'] = $_POST['selectedtype']; + write_config(); + } + + + + 5 + Configure LAN Interface + On this screen we will configure the Local Area Network information. + + + LAN IP Address + input + interfaces->lan->ipaddr + Type dhcp if this interface uses dhcp to obtain its ip address. + + + Subnet Mask + subnet_select + interfaces->lan->subnet + + + Next + submit + + + + $ft = split("\.", $_POST['lanipaddress']); + $ft_ip = $ft[0] . "." . $ft[1] . "." . $ft[2] . "."; + $config['dhcpd']['lan']['range']['from'] = $ft_ip . "10"; + $highestip = gen_subnet_max($_POST['lanipaddress'], $config['interfaces']['lan']['subnet']); + $hi = split("\.", $highestip); + $highestip = $hi[3]-10; + $config['dhcpd']['lan']['range']['to'] = $ft_ip . $highestip; + + + + 6 + Set Admin WebGUI Password + On this screen we will set the Admin password which is used to access the WebGUI and also SSH services if you wish to enable. + + + Admin Password + password + + + Admin Password AGAIN + password + + + Next + submit + + + + if($_POST['adminpassword'] != "") { + if($_POST['adminpassword'] == $_POST['adminpasswordagain']) { + $fd = popen("/usr/sbin/pw usermod -n root -H 0", "w"); + $salt = md5(time()); + $crypted_pw = crypt($_POST['adminpassword'],$salt); + fwrite($fd, $crypted_pw); + pclose($fd); + $config['system']['password'] = crypt($_POST['adminpassword']); + write_config(); + system_password_configure(); + } else { + print_info_box_np("Passwords do not match! Please press back in your browser window and correct."); + die; + } + } + + + + 7 + Reload configuration + true + Click 'Reload' to reload pfSense with new changes. If you changed the password, pfSense will ask you to log in again. + + + Reload + submit + + + + + 8 + Reload in progress + A reload is now in progress. Please wait. <p> The system will automatically try to access $myurl in 120 seconds. <p> You can click on the icon above to access the site more quickly. + <meta http-equiv="refresh" content="60; url=$myurl" > + + reload_all(); + + + -- cgit v1.2.3