From 46bc6e545a17e77202aaf01ec0cd8d5a46567525 Mon Sep 17 00:00:00 2001 From: Renato Botelho Date: Tue, 25 Aug 2015 08:08:24 -0300 Subject: Move main pfSense content to src/ --- usr/local/www/vpn_ipsec_settings.php | 445 ----------------------------------- 1 file changed, 445 deletions(-) delete mode 100644 usr/local/www/vpn_ipsec_settings.php (limited to 'usr/local/www/vpn_ipsec_settings.php') diff --git a/usr/local/www/vpn_ipsec_settings.php b/usr/local/www/vpn_ipsec_settings.php deleted file mode 100644 index ac3fde9..0000000 --- a/usr/local/www/vpn_ipsec_settings.php +++ /dev/null @@ -1,445 +0,0 @@ - $ldescr) { - if (!empty($config['ipsec']["ipsec_{$lkey}"])) { - $pconfig["ipsec_{$lkey}"] = $config['ipsec']["ipsec_{$lkey}"]; - } -} -$pconfig['unityplugin'] = isset($config['ipsec']['unityplugin']); -$pconfig['strictcrlpolicy'] = isset($config['ipsec']['strictcrlpolicy']); -$pconfig['makebeforebreak'] = isset($config['ipsec']['makebeforebreak']); -$pconfig['noshuntlaninterfaces'] = isset($config['ipsec']['noshuntlaninterfaces']); -$pconfig['compression'] = isset($config['ipsec']['compression']); -$pconfig['enableinterfacesuse'] = isset($config['ipsec']['enableinterfacesuse']); -$pconfig['acceptunencryptedmainmode'] = isset($config['ipsec']['acceptunencryptedmainmode']); -$pconfig['maxmss_enable'] = isset($config['system']['maxmss_enable']); -$pconfig['maxmss'] = $config['system']['maxmss']; -$pconfig['uniqueids'] = $config['ipsec']['uniqueids']; - -if ($_POST) { - - unset($input_errors); - $pconfig = $_POST; - - if (!in_array($pconfig['ipsec_dmn'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for Daemon debug."; - } - if (!in_array($pconfig['ipsec_mgr'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for SA Manager debug."; - } - if (!in_array($pconfig['ipsec_ike'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for IKE SA debug."; - } - if (!in_array($pconfig['ipsec_chd'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for IKE Child SA debug."; - } - if (!in_array($pconfig['ipsec_job'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for Job Processing debug."; - } - if (!in_array($pconfig['ipsec_cfg'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for Configuration backend debug."; - } - if (!in_array($pconfig['ipsec_knl'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for Kernel Interface debug."; - } - if (!in_array($pconfig['ipsec_net'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for Networking debug."; - } - if (!in_array($pconfig['ipsec_asn'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for ASN Encoding debug."; - } - if (!in_array($pconfig['ipsec_enc'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for Message encoding debug."; - } - if (!in_array($pconfig['ipsec_imc'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for Integrity checker debug."; - } - if (!in_array($pconfig['ipsec_imv'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for Integrity Verifier debug."; - } - if (!in_array($pconfig['ipsec_pts'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for Platform Trust Service debug."; - } - if (!in_array($pconfig['ipsec_tls'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for TLS Handler debug."; - } - if (!in_array($pconfig['ipsec_esp'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for IPsec Traffic debug."; - } - if (!in_array($pconfig['ipsec_lib'], array('0', '1', '2', '3', '4', '5'), true)) { - $input_errors[] = "A valid value must be specified for StrongSwan Lib debug."; - } - if (isset($pconfig['maxmss'])) { - if (!is_numericint($pconfig['maxmss']) && $pconfig['maxmss'] <> '') { - $input_errors[] = "An integer must be specified for Maximum MSS."; - } - if ($pconfig['maxmss'] <> '' && $pconfig['maxmss'] < 576 || $pconfig['maxmss'] > 65535) { - $input_errors[] = "An integer between 576 and 65535 must be specified for Maximum MSS"; - } - } - - if (!$input_errors) { - - foreach ($ipsec_loglevels as $lkey => $ldescr) { - if (empty($_POST["ipsec_{$lkey}"])) { - if (isset($config['ipsec']["ipsec_{$lkey}"])) { - unset($config['ipsec']["ipsec_{$lkey}"]); - } - } else { - $config['ipsec']["ipsec_{$lkey}"] = $_POST["ipsec_{$lkey}"]; - } - } - - $needsrestart = false; - - if ($_POST['compression'] == "yes") { - if (!isset($config['ipsec']['compression'])) { - $needsrestart = true; - } - $config['ipsec']['compression'] = true; - } elseif (isset($config['ipsec']['compression'])) { - $needsrestart = true; - unset($config['ipsec']['compression']); - } - - if ($_POST['enableinterfacesuse'] == "yes") { - if (!isset($config['ipsec']['enableinterfacesuse'])) { - $needsrestart = true; - } - $config['ipsec']['enableinterfacesuse'] = true; - } elseif (isset($config['ipsec']['enableinterfacesuse'])) { - $needsrestart = true; - unset($config['ipsec']['enableinterfacesuse']); - } - - if ($_POST['unityplugin'] == "yes") { - if (!isset($config['ipsec']['unityplugin'])) { - $needsrestart = true; - } - $config['ipsec']['unityplugin'] = true; - } elseif (isset($config['ipsec']['unityplugin'])) { - $needsrestart = true; - unset($config['ipsec']['unityplugin']); - } - - if ($_POST['strictcrlpolicy'] == "yes") { - $config['ipsec']['strictcrlpolicy'] = true; - } elseif (isset($config['ipsec']['strictcrlpolicy'])) { - unset($config['ipsec']['strictcrlpolicy']); - } - - if ($_POST['makebeforebreak'] == "yes") { - $config['ipsec']['makebeforebreak'] = true; - } elseif (isset($config['ipsec']['makebeforebreak'])) { - unset($config['ipsec']['makebeforebreak']); - } - - if ($_POST['noshuntlaninterfaces'] == "yes") { - if (isset($config['ipsec']['noshuntlaninterfaces'])) { - unset($config['ipsec']['noshuntlaninterfaces']); - } - } else { - $config['ipsec']['noshuntlaninterfaces'] = true; - } - - if ($_POST['acceptunencryptedmainmode'] == "yes") { - if (!isset($config['ipsec']['acceptunencryptedmainmode'])) { - $needsrestart = true; - } - $config['ipsec']['acceptunencryptedmainmode'] = true; - } elseif (isset($config['ipsec']['acceptunencryptedmainmode'])) { - $needsrestart = true; - unset($config['ipsec']['acceptunencryptedmainmode']); - } - - if (!empty($_POST['uniqueids'])) { - $config['ipsec']['uniqueids'] = $_POST['uniqueids']; - } else if (isset($config['ipsec']['uniqueids'])) { - unset($config['ipsec']['uniqueids']); - } - - if ($_POST['maxmss_enable'] == "yes") { - $config['system']['maxmss_enable'] = true; - $config['system']['maxmss'] = $_POST['maxmss']; - } else { - if (isset($config['system']['maxmss_enable'])) { - unset($config['system']['maxmss_enable']); - } - if (isset($config['system']['maxmss'])) { - unset($config['system']['maxmss']); - } - } - - write_config(); - - $retval = 0; - $retval = filter_configure(); - if (stristr($retval, "error") <> true) { - $savemsg = get_std_save_message(gettext($retval)); - } else { - $savemsg = gettext($retval); - } - - vpn_ipsec_configure($needsrestart); - vpn_ipsec_configure_loglevels(); - - header("Location: vpn_ipsec_settings.php"); - return; - } - - // The logic value sent by $POST is opposite to the way it is stored in the config. - // Reset the $pconfig value so it reflects the opposite of what was $POSTed. - if ($_POST['noshuntlaninterfaces'] == "yes") { - $pconfig['noshuntlaninterfaces'] = false; - } else { - $pconfig['noshuntlaninterfaces'] = true; - } -} - -$pgtitle = array(gettext("VPN"), gettext("IPsec"), gettext("Settings")); -$shortcut_section = "ipsec"; - -include("head.inc"); -?> - - - - - - -
- - - - - - - - - - -
- -
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- -
- - $ldescr): ?> - - - - - - - - -
- \n"; - foreach (array("Silent", "Audit", "Control", "Diag", "Raw", "Highest") as $lidx => $lvalue) { - echo "\n"; - } - ?> - -
-
-
- - \n"; - foreach ($ipsec_idhandling as $value => $lvalue) { - echo "\n"; - } - ?> - -
- no and never is that the old IKE_SAs will be replaced when receiving an " . - "INITIAL_CONTACT notify if the option is no but will ignore these notifies if never is configured. " . - "The daemon also accepts the value keep to reject " . - "new IKE_SA setups and keep the duplicate established earlier. Defaults to Yes."); ?> -
- /> - -
- -
- /> - -
- -
- /> - -
- -
- onclick="maxmss_checked(this)" /> - -
- " class="formfld unknown" /> -
- -
- /> - -
- -
- /> - -
- -
- /> - -
- -
- /> - -
- -
  - " /> -
-
-
-
- - - -- cgit v1.1