- Timestamp:
- 01/11/19 23:54:39 (6 years ago)
- Branches:
- master
- Children:
- 08cf024
- Parents:
- 94a6f37
- Location:
- npl/syn3/webint
- Files:
-
- 18 edited
Legend:
- Unmodified
- Added
- Removed
-
npl/syn3/webint/firewall/firewall.up
r94a6f37 r834b847 27 27 #iptables -I INPUT -i eth0 -p tcp --dport 3129 -j ACCEPT 28 28 29 #masquerade all openvpn traffic to prevent routing issues (use if syn3 is not your default gateway) 30 #iptables -t nat -IPOSTROUTING -s 10.8.0.0/24 -j MASQUERADE 29 31 30 32 exit 0 -
npl/syn3/webint/src/firewall/editfirewall.php
r94a6f37 r834b847 1 <? 1 <? 2 2 $LEVEL=10; 3 3 include_once("../common.php"); … … 35 35 list($port,$toport)=explode("-",$tmpport); 36 36 37 37 38 38 //If forward port range, then fill select box else input field. 39 if($new_access=="pat" && $toport!="") 39 if($new_access=="pat" && $toport!="") 40 40 $new_fwdports=$rule[fwdport]; 41 41 else … … 89 89 !( 90 90 ( 91 ($new_srctype=="zone_INET") 91 ($new_srctype=="zone_INET") 92 92 && ($new_dsttype=="zone_FW") 93 ) 93 ) 94 94 || ($new_dsttype=="ipadress") 95 95 || ($new_dsttype=="ipblock") … … 121 121 { 122 122 return(_SelectBridgePort()); 123 } 124 elseif (($hosttype=="openvpn_cert") && (!$host)) 125 { 126 return(_SelectOpenVPNCertifcate()); 123 127 } 124 128 } … … 159 163 list($port,$toport)=explode("-",$tmpport); 160 164 if ( 161 ($dstservicetype!='service') || 165 ($dstservicetype!='service') || 162 166 ($proto!="tcp" && $proto!="udp") || 163 167 (!$port) … … 218 222 }; 219 223 220 224 221 225 ///////////////////Html code 222 226 ?> … … 225 229 226 230 <? FormStart($TITLE); 227 231 228 232 $bridgeportselect=GetBridges(); 229 233 $openvpnselect=GetOpenVPNCerts(); 234 230 235 //transform for selectbox 231 236 foreach($IPBLOCKS as $name=>$block) … … 236 241 echo "<table class='ctrlgroup'><tr><td>"; 237 242 echo _UseOf(); 238 243 239 244 //determine services and servicegroups 240 245 $services=services_Read(); … … 254 259 } 255 260 } 256 261 257 262 //sort them 258 263 natcasesort($grouptmp); 259 264 natcasesort($servicetmp); 260 265 261 266 //merge services and service groups 262 267 foreach ($grouptmp as $groupname=>$groupdesc) … … 268 273 $servicesandgroups[_Service()]["service!$service"]=$servicedesc; 269 274 } 270 271 275 276 272 277 // Select destination service 273 SelectGrouped("new_dstserviceandtype",$servicesandgroups,$errors,"",1); 278 SelectGrouped("new_dstserviceandtype",$servicesandgroups,$errors,"",1); 274 279 echo "<a href='editservice.php'> "._New()."</a>"; 275 280 echo "</tr></table>"; 276 281 277 282 278 283 echo "<p>"; 279 284 echo "<table class='ctrlgroup'><tr><td>"; 280 285 281 286 // Select source 282 287 echo _From()." "; … … 285 290 if ($new_srctype=="ipblock") 286 291 { 287 Select("new_src",$ipblocksselect,$errors,"",1); 292 Select("new_src",$ipblocksselect,$errors,"",1); 288 293 } 289 294 elseif (($new_srctype=="hostname")||($new_srctype=="ipadress")) … … 293 298 elseif ($new_srctype=="bridgeport") 294 299 { 295 Select("new_src",$bridgeportselect,$errors,"",1); 300 Select("new_src",$bridgeportselect,$errors,"",1); 296 301 } 297 302 elseif ($new_srctype=="mac_adres") … … 299 304 InputText("new_src",$errors); 300 305 } 306 elseif ($new_srctype=="openvpn_cert") 307 { 308 Select("new_src",$openvpnselect,$errors,"",1); 309 } 301 310 echo "</tr></table>"; 302 311 303 312 // Select destination (only for forward mode) 304 313 if ($mode=="forward") … … 313 322 if ($new_dsttype=="ipblock") 314 323 { 315 Select("new_dst",$ipblocksselect,$errors,"",1); 324 Select("new_dst",$ipblocksselect,$errors,"",1); 316 325 } 317 326 elseif (($new_dsttype=="hostname")||($new_dsttype=="ipadress")) … … 321 330 elseif ($new_dsttype=="bridgeport") 322 331 { 323 Select("new_dst",$bridgeportselect,$errors,"",1); 332 Select("new_dst",$bridgeportselect,$errors,"",1); 333 } 334 elseif ($new_dsttype=="openvpn_cert") 335 { 336 Select("new_dst",$openvpnselect,$errors,"",1); 324 337 } 325 338 echo "</tr></table>"; … … 331 344 } 332 345 } 333 334 335 346 347 348 336 349 // Select access or port adress translation 337 350 echo "<p>"; … … 358 371 InputText("new_fwdport",$errors,'',1,5); 359 372 } 360 373 361 374 echo "</tr></table>"; 362 375 363 376 echo "<p>"; 364 Button("save",_Save(),""); 365 //Button("del",_Del(),_ConfirmDeleteFirewallRule(HumanReadableRule($rulearray)),$ruletxt!=""); 366 FormEnd(); 377 Button("save",_Save(),""); 378 //Button("del",_Del(),_ConfirmDeleteFirewallRule(HumanReadableRule($rulearray)),$ruletxt!=""); 379 FormEnd(); 367 380 Comment($ruletxt); 368 381 … … 376 389 echo _ThereWasAnError(); 377 390 echo "</p>"; 378 } 379 380 381 Foot(); 391 } 392 393 394 Foot(); -
npl/syn3/webint/src/firewall/firewall.php
r94a6f37 r834b847 1 <? 2 1 <? 2 3 3 $CONF_FIREWALL_DIR="/etc/firewall"; 4 4 require_once("../common.php"); … … 30 30 "mac_adres" =>_MacAdress(), 31 31 "bridgeport" =>_Bridgeport(), 32 "openvpn_cert" =>_OpenvpnCertificate(), 32 33 ); 33 34 … … 45 46 $rulearray[dsttype] one of $HOSTTYPE 46 47 $rulearray[dst], depepds on choosen dsttype (host or ipblock-name) 47 $rulearray[dstservice], one of $SERVICES: port/proto like 22/tcp 48 $rulearray[dstservice], one of $SERVICES: port/proto like 22/tcp 48 49 $rulearray[access] one of $ACCESSMODE (allow or deny or pat) 49 50 $rulearray[fwdhost] in case of pat 50 51 $rulearray[fwdport] in case of pat 51 52 52 */ 53 53 */ 54 54 55 /** Convert old comma seperated format to new config file 55 56 */ … … 73 74 else 74 75 $rulearray[enabled]=1; 75 76 76 77 list( 77 78 $rulearray[srctype], … … 84 85 $rulearray[fwdhost], 85 86 $rulearray[fwdport] 86 )=explode(",",$ruletxt); 87 )=explode(",",$ruletxt); 87 88 88 89 if ($rulearray[dstservice]=="all") … … 103 104 FileExport($CONF_FIREWALL,$rules); 104 105 } 105 106 106 107 107 108 function ReadAdminIPs() 108 { 109 { 109 110 global $CONF_ADMINS; 110 111 return(FileRead($CONF_ADMINS,1,1)); … … 115 116 { 116 117 global $ADMIN_IPS; 117 118 118 119 if (!$ip) 119 120 { … … 127 128 } 128 129 } 129 130 130 131 function WriteAdminIPs($ips) 131 { 132 { 132 133 global $CONF_ADMINS; 133 134 $ret=(FileWrite($CONF_ADMINS,$ips,1)); 134 135 135 136 global $ADMIN_IPS; 136 137 $ADMIN_IPS=ReadAdminIPs(); … … 178 179 return $ret; 179 180 } 180 181 181 182 //returns all the rules, with pat and blocking rules first 182 183 function firewall_Read() … … 186 187 uasort($rules,"firewall_SortCallback"); 187 188 return ($rules); 188 } 189 } 189 190 190 191 //changes rules with the specified rule-arrays. … … 195 196 { 196 197 global $CONF_FIREWALL; 197 198 198 199 //cleanup the rule a bit 199 200 if (strstr($newrule[dsttype],"zone_")) … … 206 207 } 207 208 209 UpdateOpenVPNIpsets(); 208 210 $rules=firewall_Read(); 209 211 … … 246 248 247 249 //store the new config 248 firewall_Write($rules); 250 firewall_Write($rules); 249 251 250 252 //call iptables backend 251 253 $err=IptablesChangeRule($oldrule,$newrule, $id); 252 254 253 255 //change any existing comment 254 256 Comment_rename($oldid,$id); 255 257 256 258 //log after everything is fixed 257 LogInfo($log); 259 LogInfo($log); 258 260 } 259 261 … … 315 317 $dstservice_txt=_Group().": ".$rulearray[dstservice]; 316 318 } 317 318 //no definition found anymore? 319 320 //no definition found anymore? 319 321 if (!$dstservice_txt) 320 322 { 321 323 $dstservice_txt="$rulearray[dstservice] (?)"; 322 324 } 323 325 324 326 if ($rulearray[access]=="pat") 325 327 { 326 328 $fwd=$rulearray[fwdhost].":".$rulearray[fwdport]; 327 329 } 328 330 329 331 return _HumanReadableRule( 330 332 $dstservice_txt, … … 352 354 list($name,$bla,$port)=explode("/",$bridge); 353 355 $ret[$port]="$port ($name)"; 354 356 355 357 } 356 358 natcasesort($ret); 357 359 return $ret; 358 360 } 361 362 /* Get list of active openvpn certificates, for selectbox */ 363 function GetOpenVPNCerts() 364 { 365 require_once("../openvpn/model.php"); 366 $certs=openvpn_List(); 367 foreach ($certs as $cert=>$status) 368 { 369 if ($status=="V") 370 $ret[$cert]="$cert"; 371 } 372 return($ret); 373 374 } 375 376 /* Make sure all openvpn ipsets exist */ 377 function UpdateOpenVPNIpsets() 378 { 379 380 require_once("../openvpn/model.php"); 381 $certs=openvpn_List(); 382 Cmd("ipset list -n|grep ^openvpn_cert", "", $existing_certs); 383 foreach ($certs as $cert=>$status) 384 { 385 if ($status=="V" && !in_array("openvpn_cert_$cert", $existing_certs)) 386 { 387 SafeExec("ipset create openvpn_cert_$cert hash:ip"); 388 } 389 } 390 } -
npl/syn3/webint/src/firewall/iptables.php
r94a6f37 r834b847 170 170 } 171 171 } 172 //openvpn certificate 173 elseif ($rule[srctype]=="openvpn_cert") 174 { 175 $src=" -m set --match-set openvpn_cert_".$rule[src]." src"; 176 } 172 177 //this server 173 178 else … … 213 218 $param.=" -m policy --pol none --dir out -o ".$ZONES[$rule[dsttype]]; 214 219 } 220 } 221 //openvpn certificate 222 elseif ($rule[dsttype]=="openvpn_cert") 223 { 224 $dst=" -m set --match-set openvpn_cert_".$rule[dst]." dst"; 215 225 } 216 226 //this server … … 398 408 LogInfo(_LogRestartingFirewall()); 399 409 410 UpdateOpenVPNIpsets(); 411 400 412 $rules=firewall_Read(); 401 413 -
npl/syn3/webint/src/firewall/lang_de.php
r94a6f37 r834b847 229 229 );} 230 230 231 function _OpenvpnCertificate($a="",$b="",$c="",$d="") { return ( 232 "OpenVPN certificate" 233 );} 234 231 235 function _OverviewAdministratorIps($a='',$b='') { return ( 232 236 "Ãbersicht ÃŒber Administratoren-IPs" … … 289 293 );} 290 294 295 function _SelectOpenVPNCertifcate($a="",$b="",$c="",$d="") { return ( 296 "Select a OpenVPN certificate" 297 );} 298 291 299 function _SelectPortRange($a="",$b="",$c="",$d="") { return ( 292 300 "Select portrange" -
npl/syn3/webint/src/firewall/lang_deD.php
r94a6f37 r834b847 230 230 );} 231 231 232 function _OpenvpnCertificate($a="",$b="",$c="",$d="") { LangDebug("OpenVPN certificate", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?src_lang=en&add_langID=de&add_labelID=_OpenvpnCertificate");return ( 233 "OpenVPN certificate" 234 );} 235 232 236 function _OverviewAdministratorIps($a='',$b='') { LangDebug("Ãbersicht ÃŒber Administratoren-IPs", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?edit_ID=3758");return ( 233 237 "Ãbersicht ÃŒber Administratoren-IPs" … … 290 294 );} 291 295 296 function _SelectOpenVPNCertifcate($a="",$b="",$c="",$d="") { LangDebug("Select a OpenVPN certificate", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?src_lang=en&add_langID=de&add_labelID=_SelectOpenVPNCertifcate");return ( 297 "Select a OpenVPN certificate" 298 );} 299 292 300 function _SelectPortRange($a="",$b="",$c="",$d="") { LangDebug("Select portrange", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?src_lang=en&add_langID=de&add_labelID=_SelectPortRange");return ( 293 301 "Select portrange" -
npl/syn3/webint/src/firewall/lang_en.php
r94a6f37 r834b847 228 228 );} 229 229 230 function _OpenvpnCertificate($a="",$b="",$c="",$d="") { return ( 231 "OpenVPN certificate" 232 );} 233 230 234 function _OverviewAdministratorIps($a='',$b='') { return ( 231 235 "Overview administrator IPs" … … 288 292 );} 289 293 294 function _SelectOpenVPNCertifcate($a="",$b="",$c="",$d="") { return ( 295 "Select a OpenVPN certificate" 296 );} 297 290 298 function _SelectPortRange($a="",$b="",$c="",$d="") { return ( 291 299 "Select portrange" -
npl/syn3/webint/src/firewall/lang_enD.php
r94a6f37 r834b847 228 228 );} 229 229 230 function _OpenvpnCertificate($a="",$b="",$c="",$d="") { LangDebug("OpenVPN certificate", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?edit_ID=8329");return ( 231 "OpenVPN certificate" 232 );} 233 230 234 function _OverviewAdministratorIps($a='',$b='') { LangDebug("Overview administrator IPs", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?edit_ID=1758");return ( 231 235 "Overview administrator IPs" … … 288 292 );} 289 293 294 function _SelectOpenVPNCertifcate($a="",$b="",$c="",$d="") { LangDebug("Select a OpenVPN certificate", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?edit_ID=8332");return ( 295 "Select a OpenVPN certificate" 296 );} 297 290 298 function _SelectPortRange($a="",$b="",$c="",$d="") { LangDebug("Select portrange", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?edit_ID=7192");return ( 291 299 "Select portrange" -
npl/syn3/webint/src/firewall/lang_nl.php
r94a6f37 r834b847 228 228 );} 229 229 230 function _OpenvpnCertificate($a="",$b="",$c="",$d="") { return ( 231 "OpenVPN certificaat" 232 );} 233 230 234 function _OverviewAdministratorIps($a='',$b='') { return ( 231 235 "Overzicht administrator IPs" … … 288 292 );} 289 293 294 function _SelectOpenVPNCertifcate($a="",$b="",$c="",$d="") { return ( 295 "Selecteer een OpenVPN certificaat" 296 );} 297 290 298 function _SelectPortRange($a="",$b="",$c="",$d="") { return ( 291 299 "Selecteer portrange" -
npl/syn3/webint/src/firewall/lang_nlD.php
r94a6f37 r834b847 228 228 );} 229 229 230 function _OpenvpnCertificate($a="",$b="",$c="",$d="") { LangDebug("OpenVPN certificaat", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?edit_ID=8330");return ( 231 "OpenVPN certificaat" 232 );} 233 230 234 function _OverviewAdministratorIps($a='',$b='') { LangDebug("Overzicht administrator IPs", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?edit_ID=794");return ( 231 235 "Overzicht administrator IPs" … … 288 292 );} 289 293 294 function _SelectOpenVPNCertifcate($a="",$b="",$c="",$d="") { LangDebug("Selecteer een OpenVPN certificaat", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?edit_ID=8331");return ( 295 "Selecteer een OpenVPN certificaat" 296 );} 297 290 298 function _SelectPortRange($a="",$b="",$c="",$d="") { LangDebug("Selecteer portrange", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?edit_ID=7191");return ( 291 299 "Selecteer portrange" -
npl/syn3/webint/src/firewall/lang_pl.php
r94a6f37 r834b847 229 229 );} 230 230 231 function _OpenvpnCertificate($a="",$b="",$c="",$d="") { return ( 232 "OpenVPN certificate" 233 );} 234 231 235 function _OverviewAdministratorIps($a='',$b='') { return ( 232 236 "Opis ogólny numerów IP administratora" … … 289 293 );} 290 294 295 function _SelectOpenVPNCertifcate($a="",$b="",$c="",$d="") { return ( 296 "Select a OpenVPN certificate" 297 );} 298 291 299 function _SelectPortRange($a="",$b="",$c="",$d="") { return ( 292 300 "Select portrange" -
npl/syn3/webint/src/firewall/lang_plD.php
r94a6f37 r834b847 230 230 );} 231 231 232 function _OpenvpnCertificate($a="",$b="",$c="",$d="") { LangDebug("OpenVPN certificate", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?src_lang=en&add_langID=pl&add_labelID=_OpenvpnCertificate");return ( 233 "OpenVPN certificate" 234 );} 235 232 236 function _OverviewAdministratorIps($a='',$b='') { LangDebug("Opis ogólny numerów IP administratora", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?edit_ID=2913");return ( 233 237 "Opis ogólny numerów IP administratora" … … 290 294 );} 291 295 296 function _SelectOpenVPNCertifcate($a="",$b="",$c="",$d="") { LangDebug("Select a OpenVPN certificate", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?src_lang=en&add_langID=pl&add_labelID=_SelectOpenVPNCertifcate");return ( 297 "Select a OpenVPN certificate" 298 );} 299 292 300 function _SelectPortRange($a="",$b="",$c="",$d="") { LangDebug("Select portrange", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?src_lang=en&add_langID=pl&add_labelID=_SelectPortRange");return ( 293 301 "Select portrange" -
npl/syn3/webint/src/firewall/lang_pt.php
r94a6f37 r834b847 228 228 );} 229 229 230 function _OpenvpnCertificate($a="",$b="",$c="",$d="") { return ( 231 "OpenVPN certificate" 232 );} 233 230 234 function _OverviewAdministratorIps($a='',$b='') { return ( 231 235 "Overview administrator IPs" … … 288 292 );} 289 293 294 function _SelectOpenVPNCertifcate($a="",$b="",$c="",$d="") { return ( 295 "Select a OpenVPN certificate" 296 );} 297 290 298 function _SelectPortRange($a="",$b="",$c="",$d="") { return ( 291 299 "Select portrange" -
npl/syn3/webint/src/firewall/lang_ptD.php
r94a6f37 r834b847 228 228 );} 229 229 230 function _OpenvpnCertificate($a="",$b="",$c="",$d="") { LangDebug("OpenVPN certificate", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?src_lang=en&add_langID=pt&add_labelID=_OpenvpnCertificate");return ( 231 "OpenVPN certificate" 232 );} 233 230 234 function _OverviewAdministratorIps($a='',$b='') { LangDebug("Overview administrator IPs", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?src_lang=en&add_langID=pt&add_labelID=_OverviewAdministratorIps");return ( 231 235 "Overview administrator IPs" … … 288 292 );} 289 293 294 function _SelectOpenVPNCertifcate($a="",$b="",$c="",$d="") { LangDebug("Select a OpenVPN certificate", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?src_lang=en&add_langID=pt&add_labelID=_SelectOpenVPNCertifcate");return ( 295 "Select a OpenVPN certificate" 296 );} 297 290 298 function _SelectPortRange($a="",$b="",$c="",$d="") { LangDebug("Select portrange", "http://www.syn-3.nl/mosaddphp/translate/editlang.php?src_lang=en&add_langID=pt&add_labelID=_SelectPortRange");return ( 291 299 "Select portrange" -
npl/syn3/webint/webint.build
r94a6f37 r834b847 1 657 01 6571 -
npl/syn3/webint/webint.md5
r94a6f37 r834b847 10 10 d41d8cd98f00b204e9800998ecf8427e ./firewall/errors 11 11 7e00dd9b440ab33f4575c0e8124c72c8 ./firewall/firewall 12 e8411d7a7ed5673e7324590d0926340d./firewall/firewall.up12 f060a5f2197070d7788ef040df885882 ./firewall/firewall.up 13 13 050405593801221c1860d21a6eb110a7 ./firewall/firewall.up.vlannat 14 14 1ab7f782053ef2c46473d8b12ea89cd9 ./firewall/ipblocks … … 215 215 a1b108c5e90aab1f4c3b430486c5d55b ./src/file.php 216 216 486abaff68646edf89c07b81584ee089 ./src/firewall/editblock.php 217 1 bf27d86734051c93f9f30bb5f2a5e1b./src/firewall/editfirewall.php217 1097d884c6e0bb582a93651d7f93bd83 ./src/firewall/editfirewall.php 218 218 ec80e8eb13abb86834f3cb0c19c162b3 ./src/firewall/editservice.php 219 a 1a2ceefec14f15fef06b2b19d6ba29f./src/firewall/firewall.php219 a866420eedbe32fed4f5426f34a52f37 ./src/firewall/firewall.php 220 220 f63d3ab0fbe4b9d9aaaadcc998307e27 ./src/firewall/ipblocks.php 221 93eba784bb406162baf8e3b236b790ec./src/firewall/iptables.php222 7d164f2b2d3d29ff5685ca8bcd88fb6f./src/firewall/lang_deD.php223 83ac93a41f7b64d992af71043ce2fe14./src/firewall/lang_de.php224 23a1129fb99ebd86910b8d74b73c9ffc ./src/firewall/lang_enD.php225 6de48bc584bf61098701c332acbc24e0./src/firewall/lang_en.php226 38907cc4c595e98cde8ef6b42c304b93./src/firewall/lang_nlD.php227 5dc0a9cb247365443cfc88099f16fc1b./src/firewall/lang_nl.php228 32626cb8860c420ef4842754e72b040e./src/firewall/lang_plD.php229 1a941b16d6f4a9746aba925d2040a849./src/firewall/lang_pl.php230 14530990decf186858de75c0f88861e6./src/firewall/lang_ptD.php231 6de48bc584bf61098701c332acbc24e0./src/firewall/lang_pt.php221 bf0383d9e3099e491b827046420c1fe3 ./src/firewall/iptables.php 222 970acf65a6cc08371792a37f4c903aa8 ./src/firewall/lang_deD.php 223 6580484024428d62b96fb9beb2a691c0 ./src/firewall/lang_de.php 224 0b21a50aa3304d8bce7d54b359a9878c ./src/firewall/lang_enD.php 225 456247175e5e6476229bc0bb4ebaae3a ./src/firewall/lang_en.php 226 99f8911b4d5b4ff71f5eb64f36738c1d ./src/firewall/lang_nlD.php 227 2fd84f30fa54ffa31a5d287ad78e6ff4 ./src/firewall/lang_nl.php 228 5bbd8eceef4790ca6c28164882054ef8 ./src/firewall/lang_plD.php 229 2c7673e3c6769e3a298a36f320042f9c ./src/firewall/lang_pl.php 230 00114a7491d267c12e7b041daaeb643c ./src/firewall/lang_ptD.php 231 456247175e5e6476229bc0bb4ebaae3a ./src/firewall/lang_pt.php 232 232 b4e77ff1a4ff1fd835bc458a5b1a9452 ./src/firewall/listadmins.php 233 233 0995d8f4569dfef3ca9fba5641cea9f4 ./src/firewall/listblocks.php … … 1160 1160 3d8b121024940b3004ca67bacb88b74e ./updatelang.sh 1161 1161 e15c0d77cf349ff3f2c55bf1b48ea567 ./upload.sh 1162 96052a8069db6a4adb15bade12539e93./webint.pkg1162 4613738b6704f1e2162e10a4debca9a6 ./webint.pkg 1163 1163 05d46c478b4e8c14eafeb686a5b8c064 ./webint.SlackBuild 1164 d1e241fb9d550d019ce72563052dab02./webint.SlackBuild.log.gz1164 313c81050c7bc6964d01fe44c94dbfb1 ./webint.SlackBuild.log.gz 1165 1165 693ffd7c59a1fe2b34276bec14f3ebfb ./zones.conf
Note: See TracChangeset
for help on using the changeset viewer.