Linux premium155.web-hosting.com 4.18.0-513.11.1.lve.el8.x86_64 #1 SMP Thu Jan 18 16:21:02 UTC 2024 x86_64
LiteSpeed
: 162.0.235.200 | : 52.15.185.147
Cant Read [ /etc/named.conf ]
7.4.33
varifktc
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
python3.6 /
site-packages /
firewall /
core /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
io
[ DIR ]
drwxr-xr-x
__init__.py
0
B
-rw-r--r--
base.py
2.05
KB
-rw-r--r--
ebtables.py
9.17
KB
-rw-r--r--
fw.py
49.22
KB
-rw-r--r--
fw_config.py
47.27
KB
-rw-r--r--
fw_direct.py
21.99
KB
-rw-r--r--
fw_helper.py
1.79
KB
-rw-r--r--
fw_icmptype.py
2.43
KB
-rw-r--r--
fw_ifcfg.py
2.5
KB
-rw-r--r--
fw_ipset.py
9.45
KB
-rw-r--r--
fw_nm.py
7.02
KB
-rw-r--r--
fw_policies.py
2.74
KB
-rw-r--r--
fw_policy.py
85.56
KB
-rw-r--r--
fw_service.py
1.6
KB
-rw-r--r--
fw_transaction.py
6.16
KB
-rw-r--r--
fw_zone.py
44.62
KB
-rw-r--r--
helper.py
804
B
-rw-r--r--
icmp.py
3.03
KB
-rw-r--r--
ipXtables.py
60.43
KB
-rw-r--r--
ipset.py
12.61
KB
-rw-r--r--
logger.py
30.31
KB
-rw-r--r--
modules.py
3.73
KB
-rw-r--r--
nftables.py
98.77
KB
-rw-r--r--
prog.py
1.47
KB
-rw-r--r--
rich.py
33.05
KB
-rw-r--r--
watcher.py
3.15
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : fw_policies.py
# -*- coding: utf-8 -*- # # Copyright (C) 2011-2016 Red Hat, Inc. # # Authors: # Thomas Woerner <twoerner@redhat.com> # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. # __all__ = [ "FirewallPolicies" ] from firewall import config from firewall.core.logger import log from firewall.core.io.lockdown_whitelist import LockdownWhitelist from firewall import errors from firewall.errors import FirewallError class FirewallPolicies(object): def __init__(self): self._lockdown = False self.lockdown_whitelist = LockdownWhitelist(config.LOCKDOWN_WHITELIST) def __repr__(self): return '%s(%r, %r)' % (self.__class__, self._lockdown, self.lockdown_whitelist) def cleanup(self): self._lockdown = False self.lockdown_whitelist.cleanup() # lockdown def access_check(self, key, value): if key == "context": log.debug2('Doing access check for context "%s"' % value) if self.lockdown_whitelist.match_context(value): log.debug3('context matches.') return True elif key == "uid": log.debug2('Doing access check for uid %d' % value) if self.lockdown_whitelist.match_uid(value): log.debug3('uid matches.') return True elif key == "user": log.debug2('Doing access check for user "%s"' % value) if self.lockdown_whitelist.match_user(value): log.debug3('user matches.') return True elif key == "command": log.debug2('Doing access check for command "%s"' % value) if self.lockdown_whitelist.match_command(value): log.debug3('command matches.') return True return False def enable_lockdown(self): if self._lockdown: raise FirewallError(errors.ALREADY_ENABLED, "enable_lockdown()") self._lockdown = True def disable_lockdown(self): if not self._lockdown: raise FirewallError(errors.NOT_ENABLED, "disable_lockdown()") self._lockdown = False def query_lockdown(self): return self._lockdown
Close