WordPress.org

Plugin Directory

Changeset 606668


Ignore:
Timestamp:
10/01/12 19:20:52 (5 years ago)
Author:
iosec
Message:
 
Location:
iosec-anti-flood-security-gateway-module/trunk
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • iosec-anti-flood-security-gateway-module/trunk/iosec.php

    r603522 r606668  
    22 /** 
    33  * @package IOSEC Anti Flood Security Gateway Module 
    4   * @version 1.8.1 
     4  * @version 1.8.2 
    55  */ 
    66 /* 
     
    88 Plugin URI: https://sourceforge.net/projects/iosec/ 
    99 Description: Anti Flood Security Gateway Module 
    10  Version: 1.8.1 
     10 Version: 1.8.2 
    1111 Author: Gokhan Muharremoglu 
    1212 Author URI: http://www.iosec.org 
     
    4545 $behind_reverse_proxy              = ""; //If your web server behind a reverse proxy, set this value to "y". 
    4646 $incremental_blocking              = "y"; //If you want to use incremental blocking, set this value to "y" (default is "y"). 
    47  $implicit_deny_timeout             = 0; // (Token access) If you want to block every request as default and let the human users to view page for a timeout period (seconds), set this value to greater than "0" (default is "0"). 
    48  $implicit_deny_for_banlist_timeout = 0; // (Token access) If you want to block every recorded IP that is listed in the banlist as default and let the human users to view page for a timeout period (seconds), set this value to greater than "0" (default is "0"). 
     47 $implicit_deny_timeout             = 0; // (Token access) If you want to block every request as default and let the human users (use_captcha) to view page for a timeout period (seconds), set this value to greater than "0" (default is "0"). 
     48 $implicit_deny_for_banlist_timeout = 0; // (Token access) If you want to block every recorded IP that is listed in the banlist as default and let the human users (use_captcha) to view page for a timeout period (seconds), set this value to greater than "0" (default is "0"). 
    4949 $cached_requests                   = 150; //Monitoring data window size for the last requests (for "ips" file size) (default is "150"). 
     50 $use_whitelist                     = ""; //If you want to use whitelist set value to "y" otherwise leave it empty (default is empty). 
     51 $use_excluded                      = ""; //If you want to use excluded file list, set this value to "y" otherwise leave it empty (default is empty). 
    5052 ///////////////////////////////////////////////////////////////////////////////////////////// 
    5153 /////////////////////////////////////////////////////////////////////////////////////////// 
     
    7981     $banlisttemp = WP_CONTENT_DIR . '/iosec_admin/banlisttemp'; 
    8082     $whitelist   = WP_CONTENT_DIR . '/iosec_admin/whitelist'; 
     83     $excluded    = WP_CONTENT_DIR . '/iosec_admin/excluded'; 
    8184     $ips         = WP_CONTENT_DIR . '/iosec_admin/ips'; 
    8285     $banlist     = WP_CONTENT_DIR . '/iosec_admin/banlist'; 
     
    245248     $let_it_go = 0; 
    246249      
     250     if ($use_excluded == "y") { 
     251      
     252      if (!file_exists($excluded)) { 
     253         fopen($excluded, 'a');      
     254     } 
     255     $read_excluded  = implode('\n', file($excluded)); 
     256     if (eregi($_SERVER['PHP_SELF'], $read_excluded)) { 
     257     $let_it_go = 1; 
     258 }  
     259     } 
     260      
     261     if ($use_whitelist == "y") { 
    247262     if (!file_exists($whitelist)) { 
    248          fopen($whitelist, 'a'); 
    249           
    250      } 
     263         fopen($whitelist, 'a');          
     264     } 
     265     $read_whitelist = implode('\n', file($whitelist)); 
     266     if (eregi($REMOTE_ADDR, $read_whitelist)) { 
     267         $let_it_go = 1; 
     268     } 
     269     } 
     270     
     271      
    251272     if (!is_writable($banlisttemp)) { 
    252273         fopen($banlisttemp, 'a'); 
     
    262283     } 
    263284     $read_blacklist = implode('\n', file($banlist)); 
    264      $read_whitelist = implode('\n', file($whitelist)); 
    265       
    266      if (eregi($REMOTE_ADDR, $read_whitelist)) { 
    267          $let_it_go = 1; 
    268      } 
     285 
    269286      
    270287     if ($let_it_go == 0) { 
  • iosec-anti-flood-security-gateway-module/trunk/readme.txt

    r603527 r606668  
    22Contributors: iosec 
    33Donate link: http://www.iosec.org/donate.html 
    4 Tags: anti flood, iosec, security, gateway, module, plugin, admin, http flood, gokhan muharremoglu, anti dos, hack, firewall, protection, spam, captcha, brute force, flood guard, stable 
     4Tags: anti flood, iosec, security, gateway, module, plugin, admin, http flood, gokhan muharremoglu, anti dos, hack, firewall, protection, spam, captcha, brute force, flood guard, ddos, stable 
    55Requires at least: 2.0.2 
    66Tested up to: 3.4.2 
    7 Stable tag: 1.8.1 
     7Stable tag: 1.8.2 
    88License: GPLv2 or later 
    99License URI: http://www.gnu.org/licenses/gpl-2.0.html 
     
    989811. Implicit Deny for banlist Timeout: If you want to block every recorded IP that is listed in the banlist as default and let the human users to view page for a timeout period (seconds), set this value to greater than "0" (default is "0"). 
    9999 
    100 CHANGES v.1.8.1 
     100CHANGES v.1.8.1 - v.1.8.2 
    101101------------------------------------------------- 
    102102- Improved Implicit Deny for Banned IP Addresses (Deny without detection) 
     103- Minor Performance Tweaks 
    103104 
    104105CHANGES v.1.5 - v.1.8 
     
    136137https://sourceforge.net/projects/iosec/ 
    137138http://www.iosec.org 
     139http://www.linkedin.com/in/gokhanmuharremoglu 
Note: See TracChangeset for help on using the changeset viewer.