* @copyright (c) 2008 Icy Phoenix * @license http://opensource.org/licenses/gpl-license.php GNU Public License * */ define('IN_LOGIN', true); define('IN_ICYPHOENIX', true); if (!defined('IP_ROOT_PATH')) define('IP_ROOT_PATH', './'); if (!defined('PHP_EXT')) define('PHP_EXT', substr(strrchr(__FILE__, '.'), 1)); include(IP_ROOT_PATH . 'common.' . PHP_EXT); include(IP_ROOT_PATH . 'includes/auth_db.' . PHP_EXT); if (!class_exists('ct_database')) { include(IP_ROOT_PATH . 'includes/ctracker/classes/class_ct_database.' . PHP_EXT); $ctracker_config = new ct_database(); } // Start session management $user->session_begin(); $auth->acl($user->data); $user->setup(); // End session management // If a bot gets redirected here is almost due to an error or a wrong page management... let's output an Error 404 code if (!empty($user->data['is_bot'])) { redirect(append_sid(CMS_PAGE_ERRORS . '?code=404', true)); } // session id check
* @since 16.07.2006 - 02:07:51 * @copyright (c) 2006 www.cback.de * */ if (!defined('IN_ICYPHOENIX')) { die('Hacking attempt!'); } /* * We check if the user has activated the IP and Hostname Blocker. * If so we use our ct_database class to load the Blocklist from the * Database in an array and check if someone who was blocked is in the list. */ if ($config['ctracker_ipblock_enabled']) { if (!class_exists('ct_database')) { include IP_ROOT_PATH . 'includes/ctracker/classes/class_ct_database.' . PHP_EXT; $ctracker_config = new ct_database(); } // Fetch Blocklist from Database $ctracker_config->unset_blocklist_verbose(); $ctracker_config->load_blocklist(); // Fetch IP UserAgent and Remote Host $ct_client_ip = $user_ip; $ct_user_agent = $_SERVER['HTTP_USER_AGENT']; $ct_remote_host = $_SERVER['REMOTE_HOST']; /* * Now we check if IP Adress, UserAgent or RemoteHost of the User * is blocked by CrackerTracker. You can use the Joker "*" to match * all expressions between 2 Words (adjustable in ACP) */ for ($i = 0; $i < $ctracker_config->blocklist_count; $i++) { /*
if (!empty($setmodules)) { $filename = basename(__FILE__); $module['1610_Users']['210_Ban_Management'] = $filename; return; } // Load default header if (!defined('IP_ROOT_PATH')) { define('IP_ROOT_PATH', './../'); } if (!defined('PHP_EXT')) { define('PHP_EXT', substr(strrchr(__FILE__, '.'), 1)); } require 'pagestart.' . PHP_EXT; if (!class_exists('ct_database')) { include IP_ROOT_PATH . 'includes/ctracker/classes/class_ct_database.' . PHP_EXT; $ctracker_config = new ct_database(); } // Start program if (isset($_POST['submit'])) { $user_bansql = ''; $email_bansql = ''; $ip_bansql = ''; $user_list = array(); $username = request_var('username', '', true); $username = htmlspecialchars_decode($username, ENT_COMPAT); if (!empty($username)) { $this_userdata = get_userdata($username, true); if (!$this_userdata) { if (!defined('STATUS_404')) { define('STATUS_404', true); }