summaryrefslogtreecommitdiffstats
path: root/perl-install/standalone/net_applet
diff options
context:
space:
mode:
authorOlivier Blin <oblin@mandriva.org>2005-08-18 14:06:36 +0000
committerOlivier Blin <oblin@mandriva.org>2005-08-18 14:06:36 +0000
commitb1f3e31be392df619d794daa714f61a858d3e35c (patch)
tree11bc68375e43e91441a5b2e7b3dc29f15fccc0db /perl-install/standalone/net_applet
parent788075abe4be752a91505eb74bad1e819d791de6 (diff)
downloaddrakx-backup-do-not-use-b1f3e31be392df619d794daa714f61a858d3e35c.tar
drakx-backup-do-not-use-b1f3e31be392df619d794daa714f61a858d3e35c.tar.gz
drakx-backup-do-not-use-b1f3e31be392df619d794daa714f61a858d3e35c.tar.bz2
drakx-backup-do-not-use-b1f3e31be392df619d794daa714f61a858d3e35c.tar.xz
drakx-backup-do-not-use-b1f3e31be392df619d794daa714f61a858d3e35c.zip
new name is Interactive Firewall
Diffstat (limited to 'perl-install/standalone/net_applet')
-rw-r--r--perl-install/standalone/net_applet24
1 files changed, 12 insertions, 12 deletions
diff --git a/perl-install/standalone/net_applet b/perl-install/standalone/net_applet
index 37399329c..89d531f11 100644
--- a/perl-install/standalone/net_applet
+++ b/perl-install/standalone/net_applet
@@ -10,7 +10,7 @@ use network::tools;
use run_program;
use mygtk2 qw(gtknew);
use dbus_object;
-use network::activefw;
+use network::ifw;
use network::monitor;
use detect_devices;
@@ -32,7 +32,7 @@ my $watched_interface;
my $dbus = dbus_object::system_bus();
my $monitor = network::monitor->new($dbus);
-my ($activefw, $interactive_cb, @attacks_queue);
+my ($ifw, $interactive_cb, @attacks_queue);
my %pixbufs =
(
@@ -109,13 +109,13 @@ $balloon->signal_connect(button_press_event => sub {
ask_attack_verdict($attacks_queue[0]);
});
-$activefw = network::activefw->new($dbus, sub {
+$ifw = network::ifw->new($dbus, sub {
my ($_con, $msg) = @_;
my $member = $msg->get_member;
if ($member eq 'Attack') {
handle_attack($msg->get_args_list);
} elsif ($member eq 'Init') {
- $activefw->attach_object;
+ $ifw->attach_object;
checkNetworkForce();
}
});
@@ -281,11 +281,11 @@ sub generate_menu {
push @settings, $create_item->('chooseProfile');
my $interactive;
- eval { $interactive = $activefw->get_interactive };
+ eval { $interactive = $ifw->get_interactive };
if (defined $interactive) {
$interactive_cb = gtkshow(gtksignal_connect(gtkset_active(Gtk2::CheckMenuItem->new_with_label(N("Interactive intrusion detection")),
$interactive),
- toggled => sub { eval { $activefw->set_interactive(to_bool($_[0]->get_active)) } }));
+ toggled => sub { eval { $ifw->set_interactive(to_bool($_[0]->get_active)) } }));
push @settings, $interactive_cb;
}
push @settings, gtkshow(gtksignal_connect(gtkset_active(Gtk2::CheckMenuItem->new_with_label(N("Always launch on startup")), getAutoStart()),
@@ -317,7 +317,7 @@ sub setAutoStart {
}
sub get_unprocessed_attacks() {
- my @packets = eval { $activefw->get_reports };
+ my @packets = eval { $ifw->get_reports };
while (my @attack = splice(@packets, 0, 9)) {
handle_attack(@attack);
}
@@ -325,9 +325,9 @@ sub get_unprocessed_attacks() {
sub handle_attack {
my $attack = { mapn { $_[0] => $_[1] } [ 'seq', 'timestamp', 'indev', 'prefix', 'sensor', 'protocol', 'addr', 'port', 'icmp_type' ], \@_ };
- $attack->{ip_addr} = network::activefw::get_ip_address($attack->{addr});
- $attack->{hostname} = network::activefw::resolve_address($attack->{ip_addr});
- $attack->{service} = network::activefw::get_service($attack->{port});
+ $attack->{ip_addr} = network::ifw::get_ip_address($attack->{addr});
+ $attack->{hostname} = network::ifw::resolve_address($attack->{ip_addr});
+ $attack->{service} = network::ifw::get_service($attack->{port});
$attack->{msg} = $attack->{prefix} eq "SCAN" ? N("A port scanning attack has been attempted by %s.", $attack->{hostname})
: $attack->{prefix} eq "SERV" ? N("The %s service has been attacked by %s.", $attack->{service}, $attack->{hostname})
: $attack->{prefix} eq "PASS" ? N("A password cracking attack has been attempted by %s.", $attack->{hostname})
@@ -341,7 +341,7 @@ sub set_blacklist_verdict {
#- default is to blacklist
defined $verdict or $verdict = 1;
- eval { $activefw->blacklist($seq, $verdict) };
+ eval { $ifw->blacklist($seq, $verdict) };
$@ and err_dialog(N("Active Firewall"), N("Unable to contact daemon"));
shift @attacks_queue;
@@ -394,7 +394,7 @@ sub ask_attack_verdict {
gtknew('HBox', children => [
0, gtknew('Label', text => " "),
1, gtknew('VBox', children_loose => [
- N("Attack time: %s", network::activefw::format_date($attack->{timestamp})),
+ N("Attack time: %s", network::ifw::format_date($attack->{timestamp})),
N("Network interface: %s", $attack->{indev}),
N("Attack type: %s", $attack->{prefix}),
if_($attack->{protocol}, N("Protocol: %s", $attack->{protocol})),