Linux cyberpanel 5.15.0-156-generic #166-Ubuntu SMP Sat Aug 9 00:02:46 UTC 2025 x86_64
LiteSpeed
: 160.191.175.3 | : 216.73.216.114
Cant Read [ /etc/named.conf ]
8.2.29
aodai6801
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
python3 /
dist-packages /
firewall /
core /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
io
[ DIR ]
drwxr-xr-x
__init__.py
0
B
-rw-r--r--
base.py
2.02
KB
-rw-r--r--
ebtables.py
9.17
KB
-rw-r--r--
fw.py
51.83
KB
-rw-r--r--
fw_config.py
47.34
KB
-rw-r--r--
fw_direct.py
21.51
KB
-rw-r--r--
fw_helper.py
1.79
KB
-rw-r--r--
fw_icmptype.py
2.83
KB
-rw-r--r--
fw_ifcfg.py
2.5
KB
-rw-r--r--
fw_ipset.py
9.45
KB
-rw-r--r--
fw_nm.py
6.62
KB
-rw-r--r--
fw_policies.py
2.74
KB
-rw-r--r--
fw_policy.py
75.65
KB
-rw-r--r--
fw_service.py
1.6
KB
-rw-r--r--
fw_transaction.py
5.73
KB
-rw-r--r--
fw_zone.py
42.45
KB
-rw-r--r--
helper.py
804
B
-rw-r--r--
icmp.py
3.03
KB
-rw-r--r--
ipXtables.py
62.07
KB
-rw-r--r--
ipset.py
12.57
KB
-rw-r--r--
logger.py
30.31
KB
-rw-r--r--
modules.py
3.63
KB
-rw-r--r--
nftables.py
93.16
KB
-rw-r--r--
prog.py
1.47
KB
-rw-r--r--
rich.py
34.29
KB
-rw-r--r--
watcher.py
3.15
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : fw_policies.py
# -*- coding: utf-8 -*- # # Copyright (C) 2011-2016 Red Hat, Inc. # # Authors: # Thomas Woerner <twoerner@redhat.com> # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. # __all__ = [ "FirewallPolicies" ] from firewall import config from firewall.core.logger import log from firewall.core.io.lockdown_whitelist import LockdownWhitelist from firewall import errors from firewall.errors import FirewallError class FirewallPolicies(object): def __init__(self): self._lockdown = False self.lockdown_whitelist = LockdownWhitelist(config.LOCKDOWN_WHITELIST) def __repr__(self): return '%s(%r, %r)' % (self.__class__, self._lockdown, self.lockdown_whitelist) def cleanup(self): self._lockdown = False self.lockdown_whitelist.cleanup() # lockdown def access_check(self, key, value): if key == "context": log.debug2('Doing access check for context "%s"' % value) if self.lockdown_whitelist.match_context(value): log.debug3('context matches.') return True elif key == "uid": log.debug2('Doing access check for uid %d' % value) if self.lockdown_whitelist.match_uid(value): log.debug3('uid matches.') return True elif key == "user": log.debug2('Doing access check for user "%s"' % value) if self.lockdown_whitelist.match_user(value): log.debug3('user matches.') return True elif key == "command": log.debug2('Doing access check for command "%s"' % value) if self.lockdown_whitelist.match_command(value): log.debug3('command matches.') return True return False def enable_lockdown(self): if self._lockdown: raise FirewallError(errors.ALREADY_ENABLED, "enable_lockdown()") self._lockdown = True def disable_lockdown(self): if not self._lockdown: raise FirewallError(errors.NOT_ENABLED, "disable_lockdown()") self._lockdown = False def query_lockdown(self): return self._lockdown
Close