wok-current rev 16710
squidguard: Add patch
author | Eric Joseph-Alexandre <erjo@slitaz.org> |
---|---|
date | Thu May 29 00:03:26 2014 +0200 (2014-05-29) |
parents | 72166e2a51e5 |
children | ba5bfceaee49 |
files | squidguard/stuff/squidGuard-1.4-dnsbl.patch squidguard/stuff/squidGuard-1.4_upgrade.patch |
line diff
1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 1.2 +++ b/squidguard/stuff/squidGuard-1.4-dnsbl.patch Thu May 29 00:03:26 2014 +0200 1.3 @@ -0,0 +1,282 @@ 1.4 +diff -Naurb squidGuard-1.4/doc/configuration.html squidGuard-1.4-dnsbl/doc/configuration.html 1.5 +--- squidGuard-1.4/doc/configuration.html 2007-11-16 17:58:32.000000000 +0100 1.6 ++++ squidGuard-1.4-dnsbl/doc/configuration.html 2009-03-04 18:07:15.000000000 +0100 1.7 +@@ -1630,6 +1630,15 @@ 1.8 + "<B><TT>^[^:/]+://[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}($|[:/])</TT></B>". 1.9 + </DD> 1.10 + <DT> 1.11 ++ <B>dnsbl</B> 1.12 ++ </DT> 1.13 ++ <DD> 1.14 ++ <B>!dnsbl</B> can be used to dynamically check domain names against 1.15 ++ DNS-based blacklists, such as black.uribl.com, which is the default. 1.16 ++ The DNS blacklist can be set to another domain by setting 1.17 ++ !dnsbl:your.blacklist.domain.com 1.18 ++ </DD> 1.19 ++ <DT> 1.20 + <B>any</B> 1.21 + </DT> 1.22 + <DD> 1.23 +@@ -2419,6 +2428,9 @@ 1.24 + even if they would match a blocking regex: 1.25 + <BR> 1.26 + <TT><B>+</B></TT> limiting the usage of IP-address URLs: 1.27 ++ <BR> 1.28 ++ <TT><B>+</B></TT> blocking sites known to be part of the 1.29 ++ black.uribl.com DNS blacklist. 1.30 + </P> 1.31 + 1.32 + <TT> 1.33 +@@ -2442,7 +2454,7 @@ 1.34 + 1.35 + acl { 1.36 + default { 1.37 +- pass local good !in-addr !porn all 1.38 ++ pass local good !in-addr !porn !dnsbl:black.uribl.com all 1.39 + redirect http://localhost/cgi/blocked?clientaddr=%a&clientname=%n&clientuser=%i&clientgroup=%s&url=%u 1.40 + } 1.41 + } 1.42 +diff -Naurb squidGuard-1.4/doc/configuration.txt squidGuard-1.4-dnsbl/doc/configuration.txt 1.43 +--- squidGuard-1.4/doc/configuration.txt 2007-11-16 17:58:32.000000000 +0100 1.44 ++++ squidGuard-1.4-dnsbl/doc/configuration.txt 2009-03-04 18:09:39.000000000 +0100 1.45 +@@ -637,6 +637,12 @@ 1.46 + "^[^:/]+://[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9 1.47 + ]\{1,3\}($|[:/])". 1.48 + 1.49 ++ dnsbl 1.50 ++ !dnsbl can be used to dynamically check domain names against 1.51 ++ DNS-based blacklists, such as black.uribl.com, which is the default. 1.52 ++ The DNS blacklist can be set to another domain by setting 1.53 ++ !dnsbl:your.blacklist.domain.com 1.54 ++ 1.55 + any 1.56 + matches any URL and is a fast equivalent to the 1.57 + expression ".*". 1.58 +@@ -1052,6 +1058,7 @@ 1.59 + + ensuring local and good sites are passed even if they would match a 1.60 + blocking regex: 1.61 + + limiting the usage of IP-address URLs: 1.62 ++ + blocking sites known to be part of the black.uribl.com DNS blacklist: 1.63 + logdir /usr/local/squidGuard/log 1.64 + dbhome /usr/local/squidGuard/db 1.65 + 1.66 +@@ -1071,7 +1078,7 @@ 1.67 + 1.68 + acl { 1.69 + default { 1.70 +- pass local good !in-addr !porn all 1.71 ++ pass local good !in-addr !porn !dnsbl:black.uribl.com all 1.72 + redirect http://localhost/cgi/blocked?clientaddr=%a&clientname=%n& 1.73 + clientuser=%i&clientgroup=%s&url=%u 1.74 + } 1.75 +diff -Naurb squidGuard-1.4/doc/extended.html squidGuard-1.4-dnsbl/doc/extended.html 1.76 +--- squidGuard-1.4/doc/extended.html 2007-11-16 17:58:37.000000000 +0100 1.77 ++++ squidGuard-1.4-dnsbl/doc/extended.html 2009-03-04 18:15:59.000000000 +0100 1.78 +@@ -168,6 +168,34 @@ 1.79 + </pre> 1.80 + </td></tr></table> 1.81 + <br><br> 1.82 ++ 1.83 ++<li> <a name=notIP> <b>Using online DNS blacklists</b></a><br><br> 1.84 ++Several DNS based databases can be used to block domain names referrenced in 1.85 ++blacklists. First choose which database you would like to trust (some well known 1.86 ++are : http://www.uribl.com/, or http://www.surbl.org/). 1.87 ++Be aware that this will raise several DNS requests every time squidGuard 1.88 ++receives a request to filter. SquidGuard will not cache any DNS result, so make 1.89 ++sure your DNS server does, and mesure the performance impact before using on 1.90 ++production. 1.91 ++To get squidGuard to request DNS dynamically and block listed domain names, just use : 1.92 ++<br><br> 1.93 ++<table width="75%" cellpadding="0" cellspacing="0" style="background-color: #f2fff0; border: solid 1px #2299bf;"> 1.94 ++<tr> 1.95 ++<td style="background-color: #77afaf; border-bottom: 1px solid #888;"> <font size="-1" color=white>Blocking domain names referenced in a DNS blacklist</font> 1.96 ++</td></tr> 1.97 ++<tr> 1.98 ++<td> 1.99 ++<pre> acl { 1.100 ++ default { 1.101 ++ pass !dnsbl:black.uribl.com all 1.102 ++ redirect http://localhost/block.html 1.103 ++ } 1.104 ++ } 1.105 ++</pre> 1.106 ++</td></tr> 1.107 ++</table> 1.108 ++<br><br> 1.109 ++ 1.110 + <li><a name=blocklog><b>Logging blocked access tries</b></a> 1.111 + <br><br> 1.112 + It may be of interest who is accessing blocked sites. To track that 1.113 +diff -Naurb squidGuard-1.4/doc/extended.txt squidGuard-1.4-dnsbl/doc/extended.txt 1.114 +--- squidGuard-1.4/doc/extended.txt 2007-11-16 17:58:32.000000000 +0100 1.115 ++++ squidGuard-1.4-dnsbl/doc/extended.txt 2009-03-04 18:18:01.000000000 +0100 1.116 +@@ -100,6 +100,29 @@ 1.117 + 172.16.12.0/255.255.255.0 1.118 + 10.5.3.1/28 1.119 + 1.120 ++ Using online DNS blacklists 1.121 ++ Several DNS based databases can be used to block domain names referrenced in 1.122 ++ blacklists. First choose which database you would like to trust (some well known 1.123 ++ are : http://www.uribl.com/, or http://www.surbl.org/). 1.124 ++ Be aware that this will raise several DNS requests every time squidGuard 1.125 ++ receives a request to filter. SquidGuard will not cache any DNS result, so make 1.126 ++ sure your DNS server does, and mesure the performance impact before using on 1.127 ++ production. 1.128 ++ To get squidGuard to request DNS dynamically and block listed domain names, just use : 1.129 ++acl { 1.130 ++ default { 1.131 ++ pass !dnsbl:black.uribl.com all 1.132 ++ redirect http://localhost/block.html 1.133 ++ } 1.134 ++} 1.135 ++ 1.136 ++ 1.137 ++ 1.138 ++ 1.139 ++ 1.140 ++ 1.141 ++ 1.142 ++ 1.143 + Logging blocked access tries 1.144 + It may be of interest who is accessing blocked sites. To track that 1.145 + down you can add a log directive to your src or dest definitions in 1.146 +diff -Naurb squidGuard-1.4/src/sg.h.in squidGuard-1.4-dnsbl/src/sg.h.in 1.147 +--- squidGuard-1.4/src/sg.h.in 2007-11-16 17:58:32.000000000 +0100 1.148 ++++ squidGuard-1.4-dnsbl/src/sg.h.in 2009-03-04 17:38:32.000000000 +0100 1.149 +@@ -68,6 +68,7 @@ 1.150 + #define ACL_TYPE_DEFAULT 1 1.151 + #define ACL_TYPE_TERMINATOR 2 1.152 + #define ACL_TYPE_INADDR 3 1.153 ++#define ACL_TYPE_DNSBL 4 1.154 + 1.155 + #define REQUEST_TYPE_REWRITE 1 1.156 + #define REQUEST_TYPE_REDIRECT 2 1.157 +@@ -301,6 +302,7 @@ 1.158 + 1.159 + struct AclDest { 1.160 + char *name; 1.161 ++ char *dns_suffix; 1.162 + struct Destination *dest; 1.163 + int access; 1.164 + int type; 1.165 +diff -Naurb squidGuard-1.4/src/sg.y.in squidGuard-1.4-dnsbl/src/sg.y.in 1.166 +--- squidGuard-1.4/src/sg.y.in 2008-05-17 20:25:18.000000000 +0200 1.167 ++++ squidGuard-1.4-dnsbl/src/sg.y.in 2009-03-22 21:43:08.000000000 +0100 1.168 +@@ -2253,6 +2274,7 @@ 1.169 + int allowed; 1.170 + #endif 1.171 + { 1.172 ++ char *subval = NULL; 1.173 + struct Destination *dest = NULL; 1.174 + struct sgRewrite *rewrite = NULL; 1.175 + struct AclDest *acldest; 1.176 +@@ -2264,6 +2286,9 @@ 1.177 + allowed=0; 1.178 + else if(!strcmp(value,"in-addr")){ 1.179 + type = ACL_TYPE_INADDR; 1.180 ++ } else if (!strncmp(value,"dnsbl",5)) { 1.181 ++ subval = strstr(value,":"); 1.182 ++ type = ACL_TYPE_DNSBL; 1.183 + } else { 1.184 + if((dest = sgDestFindName(value)) == NULL){ 1.185 + sgLogFatalError("%s: ACL destination %s is not defined in configfile %s", 1.186 +@@ -2278,6 +2303,25 @@ 1.187 + acldest->dest = dest; 1.188 + acldest->access = allowed; 1.189 + acldest->type = type; 1.190 ++ if (type == ACL_TYPE_DNSBL) 1.191 ++ { 1.192 ++ if ((subval==NULL) || (subval[1])=='\0')//Config does not define which dns domain to use 1.193 ++ { 1.194 ++ acldest->dns_suffix = (char *) sgCalloc(1,strlen(".black.uribl.com")+1); 1.195 ++ strcpy(acldest->dns_suffix, ".black.uribl.com"); 1.196 ++ }else{ 1.197 ++ subval=subval+1; 1.198 ++ if (strspn(subval,".-abcdefghijklmnopqrstuvwxyz0123456789") != 1.199 ++ strlen(subval) ) 1.200 ++ { 1.201 ++ sgLogFatalError("%s: provided dnsbl \"%s\" doesn't look like a valid domain suffix", 1.202 ++ progname,subval); 1.203 ++ } 1.204 ++ acldest->dns_suffix = (char *) sgCalloc(1,strlen(subval)+1); 1.205 ++ strcpy(acldest->dns_suffix, "."); 1.206 ++ strcat(acldest->dns_suffix,subval); 1.207 ++ } 1.208 ++ } 1.209 + acldest->next = NULL; 1.210 + if(lastAcl->pass == NULL){ 1.211 + lastAcl->pass = acldest; 1.212 +@@ -2365,6 +2409,56 @@ 1.213 + return acl; 1.214 + } 1.215 + 1.216 ++char *strip_fqdn(char *domain) 1.217 ++{ 1.218 ++ char *result; 1.219 ++ result=strstr(domain,"."); 1.220 ++ if (result == NULL) 1.221 ++ return NULL; 1.222 ++ return (result+1); 1.223 ++} 1.224 ++ 1.225 ++int is_blacklisted(char *domain, char *suffix) 1.226 ++{ 1.227 ++ char target[MAX_BUF]; 1.228 ++ struct addrinfo *res; 1.229 ++ int result; 1.230 ++ //Copying domain to target 1.231 ++ if (strlen(domain)+strlen(suffix)+1>MAX_BUF) 1.232 ++ { 1.233 ++ //Buffer overflow risk - just return and accept 1.234 ++@NOLOG1@ 1.235 ++ if( globalDebug == 1 ) { sgLogError("dnsbl : too long domain name - accepting without actual check"); } 1.236 ++@NOLOG2@ 1.237 ++ return(0); 1.238 ++ } 1.239 ++ strncpy(target,domain,strlen(domain)+1); 1.240 ++ strcat(target,suffix); 1.241 ++ 1.242 ++ result = getaddrinfo(target,NULL,NULL,&res); 1.243 ++ if (result == 0) //Result is defined 1.244 ++ { 1.245 ++ freeaddrinfo(res); 1.246 ++ return 1; 1.247 ++ } 1.248 ++ //If anything fails (DNS server not reachable, any problem in the resolution, 1.249 ++ //let's not block anything. 1.250 ++ return 0; 1.251 ++} 1.252 ++ 1.253 ++int blocked_by_dnsbl(char *domain, char *suffix) 1.254 ++{ 1.255 ++ char *dn=domain; 1.256 ++ while ((dn !=NULL) && (strchr(dn,'.')!=NULL)) //No need to lookup "com.black.uribl.com" 1.257 ++ { 1.258 ++ if (is_blacklisted(dn,suffix)) 1.259 ++ return(1); 1.260 ++ dn=strip_fqdn(dn); 1.261 ++ } 1.262 ++ return 0; 1.263 ++} 1.264 ++ 1.265 ++ 1.266 + #if __STDC__ 1.267 + char *sgAclAccess(struct Source *src, struct Acl *acl, struct SquidInfo *req) 1.268 + #else 1.269 +@@ -2397,6 +2491,16 @@ 1.270 + } 1.271 + continue; 1.272 + } 1.273 ++ // http://www.yahoo.fr/ 172.16.2.32 - GET 1.274 ++ if(aclpass->type == ACL_TYPE_DNSBL){ 1.275 ++ if (req->dot) 1.276 ++ continue; 1.277 ++ if (blocked_by_dnsbl(req->domain, aclpass->dns_suffix)){ 1.278 ++ access=0; 1.279 ++ break; 1.280 ++ } 1.281 ++ continue; 1.282 ++ } 1.283 + if(aclpass->dest->domainlistDb != NULL){ 1.284 + result = defined(aclpass->dest->domainlistDb, req->domain, &dbdata); 1.285 + if(result != DB_NOTFOUND) {
2.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 2.2 +++ b/squidguard/stuff/squidGuard-1.4_upgrade.patch Thu May 29 00:03:26 2014 +0200 2.3 @@ -0,0 +1,76 @@ 2.4 +diff -urN squidGuard-1.4.orig/src/main.c squidGuard-1.4.upgraded/src/main.c 2.5 +--- squidGuard-1.4.orig/src/main.c 2013-12-11 17:42:15.000000000 +1300 2.6 ++++ squidGuard-1.4.upgraded/src/main.c 2013-12-11 19:04:09.000000000 +1300 2.7 +@@ -175,7 +175,7 @@ 2.8 + sgReloadConfig(); 2.9 + } 2.10 + if(failsafe_mode) { 2.11 +- puts(""); 2.12 ++ puts("ERR message=\"squidGuard failsafe mode\""); 2.13 + fflush(stdout); 2.14 + if(sig_hup){ 2.15 + sgReloadConfig(); 2.16 +@@ -184,7 +184,7 @@ 2.17 + } 2.18 + if(parseLine(buf,&squidInfo) != 1){ 2.19 + sgLogError("Error parsing squid line: %s",buf); 2.20 +- puts(""); 2.21 ++ puts("BH message=\"squidGuard error parsing squid line\""); 2.22 + } 2.23 + else { 2.24 + src = Source; 2.25 +@@ -196,14 +196,14 @@ 2.26 + acl = sgAclCheckSource(src); 2.27 + if((redirect = sgAclAccess(src,acl,&squidInfo)) == NULL){ 2.28 + if(src == NULL || src->cont_search == 0){ 2.29 +- puts(""); 2.30 ++ puts("ERR"); 2.31 + break; 2.32 + } else 2.33 + if(src->next != NULL){ 2.34 + src = src->next; 2.35 + continue; 2.36 + } else { 2.37 +- puts(""); 2.38 ++ puts("ERR"); 2.39 + break; 2.40 + } 2.41 + } else { 2.42 +@@ -215,9 +215,10 @@ 2.43 + squidInfo.ident[0] = '-'; 2.44 + squidInfo.ident[1] = '\0'; 2.45 + } 2.46 +- fprintf(stdout,"%s %s/%s %s %s\n",redirect,squidInfo.src, 2.47 +- squidInfo.srcDomain,squidInfo.ident, 2.48 +- squidInfo.method); 2.49 ++ if (isdigit(redirect[0]) && isdigit(redirect[1]) && isdigit(redirect[2]) && redirect[3]==':') { 2.50 ++ fprintf(stdout,"OK status=%c%c%c url=\"%s\"\n", redirect[0], redirect[1], redirect[2], &redirect[4]); 2.51 ++ } else 2.52 ++ fprintf(stdout,"OK rewrite-url=\"%s\"\n",redirect); 2.53 + /* sgLogError("%s %s/%s %s %s\n",redirect,squidInfo.src,squidInfo.srcDomain,squidInfo.ident,squidInfo.method); */ 2.54 + break; 2.55 + } 2.56 +diff -urN squidGuard-1.4.orig/src/sgDiv.c squidGuard-1.4.upgraded/src/sgDiv.c 2.57 +--- squidGuard-1.4.orig/src/sgDiv.c 2013-12-11 17:42:15.000000000 +1300 2.58 ++++ squidGuard-1.4.upgraded/src/sgDiv.c 2013-12-11 18:58:33.000000000 +1300 2.59 +@@ -771,7 +771,7 @@ 2.60 + } 2.61 + sgLogError("Going into emergency mode"); 2.62 + while(fgets(buf, MAX_BUF, stdin) != NULL){ 2.63 +- puts(""); 2.64 ++ puts("ERR"); 2.65 + fflush(stdout); 2.66 + } 2.67 + sgLogError("ending emergency mode, stdin empty"); 2.68 +diff -urN squidGuard-1.4.orig/src/sgDiv.c.in squidGuard-1.4.upgraded/src/sgDiv.c.in 2.69 +--- squidGuard-1.4.orig/src/sgDiv.c.in 2013-12-11 17:42:15.000000000 +1300 2.70 ++++ squidGuard-1.4.upgraded/src/sgDiv.c.in 2013-12-11 18:58:40.000000000 +1300 2.71 +@@ -782,7 +782,7 @@ 2.72 + } 2.73 + sgLogError("Going into emergency mode"); 2.74 + while(fgets(buf, MAX_BUF, stdin) != NULL){ 2.75 +- puts(""); 2.76 ++ puts("ERR"); 2.77 + fflush(stdout); 2.78 + } 2.79 + sgLogError("ending emergency mode, stdin empty");