|
|
@ -9,9 +9,11 @@ my $n = esmith::NetworksDB->open_ro() || |
|
|
|
my @ip = ("127.0.0.0/8", $LocalIP); |
|
|
|
my @ip = ("127.0.0.0/8", $LocalIP); |
|
|
|
|
|
|
|
|
|
|
|
# Add hosts which can access the server-manager to the whitelist |
|
|
|
# Add hosts which can access the server-manager to the whitelist |
|
|
|
|
|
|
|
unless (($fail2ban{FilterValidRemoteHosts} || 'disabled') eq 'enabled'){ |
|
|
|
foreach (split /[,;]/, (${'httpd-admin'}{'ValidFrom'} || '')){ |
|
|
|
foreach (split /[,;]/, (${'httpd-admin'}{'ValidFrom'} || '')){ |
|
|
|
my ($ip,$bits) = Net::IPv4Addr::ipv4_parse("$_"); |
|
|
|
my ($ip,$bits) = Net::IPv4Addr::ipv4_parse("$_"); |
|
|
|
push @ip, "$ip/$bits"; |
|
|
|
push @ip, "$ip/$bits" unless "$ip/$bits" eq '0.0.0.0/0'; |
|
|
|
|
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
unless (($fail2ban{FilterLocalNetworks} || 'disabled') eq 'enabled'){ |
|
|
|
unless (($fail2ban{FilterLocalNetworks} || 'disabled') eq 'enabled'){ |
|
|
|