mirror of https://github.com/fail2ban/fail2ban
177 lines
5.2 KiB
Python
177 lines
5.2 KiB
Python
|
#!/usr/bin/env python
|
||
|
|
||
|
# This file is part of Fail2Ban.
|
||
|
#
|
||
|
# Fail2Ban is free software; you can redistribute it and/or modify
|
||
|
# it under the terms of the GNU General Public License as published by
|
||
|
# the Free Software Foundation; either version 2 of the License, or
|
||
|
# (at your option) any later version.
|
||
|
#
|
||
|
# Fail2Ban is distributed in the hope that it will be useful,
|
||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
|
# GNU General Public License for more details.
|
||
|
#
|
||
|
# You should have received a copy of the GNU General Public License
|
||
|
# along with Fail2Ban; if not, write to the Free Software
|
||
|
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||
|
|
||
|
# Author: Cyril Jaquier
|
||
|
#
|
||
|
# $Revision$
|
||
|
|
||
|
__author__ = "Cyril Jaquier"
|
||
|
__version__ = "$Revision$"
|
||
|
__date__ = "$Date$"
|
||
|
__copyright__ = "Copyright (c) 2004 Cyril Jaquier"
|
||
|
__license__ = "GPL"
|
||
|
|
||
|
import posix, time, sys, getopt, os, signal
|
||
|
|
||
|
from firewall.iptables import Iptables
|
||
|
from logreader.metalog import Metalog
|
||
|
|
||
|
def usage():
|
||
|
print "fail2ban [-h][-v][-b]"
|
||
|
sys.exit(0)
|
||
|
|
||
|
def checkForRoot():
|
||
|
""" Check for root user.
|
||
|
"""
|
||
|
uid = `posix.getuid()`
|
||
|
if uid == '0':
|
||
|
return True
|
||
|
else:
|
||
|
return False
|
||
|
|
||
|
def createDaemon():
|
||
|
"""Detach a process from the controlling terminal and run it in the
|
||
|
background as a daemon.
|
||
|
|
||
|
http://aspn.activestate.com/ASPN/Cookbook/Python/Recipe/278731
|
||
|
"""
|
||
|
|
||
|
try:
|
||
|
# Fork a child process so the parent can exit. This will return control
|
||
|
# to the command line or shell. This is required so that the new process
|
||
|
# is guaranteed not to be a process group leader. We have this guarantee
|
||
|
# because the process GID of the parent is inherited by the child, but
|
||
|
# the child gets a new PID, making it impossible for its PID to equal its
|
||
|
# PGID.
|
||
|
pid = os.fork()
|
||
|
except OSError, e:
|
||
|
return((e.errno, e.strerror)) # ERROR (return a tuple)
|
||
|
|
||
|
if (pid == 0): # The first child.
|
||
|
|
||
|
# Next we call os.setsid() to become the session leader of this new
|
||
|
# session. The process also becomes the process group leader of the
|
||
|
# new process group. Since a controlling terminal is associated with a
|
||
|
# session, and this new session has not yet acquired a controlling
|
||
|
# terminal our process now has no controlling terminal. This shouldn't
|
||
|
# fail, since we're guaranteed that the child is not a process group
|
||
|
# leader.
|
||
|
os.setsid()
|
||
|
|
||
|
# When the first child terminates, all processes in the second child
|
||
|
# are sent a SIGHUP, so it's ignored.
|
||
|
signal.signal(signal.SIGHUP, signal.SIG_IGN)
|
||
|
|
||
|
try:
|
||
|
# Fork a second child to prevent zombies. Since the first child is
|
||
|
# a session leader without a controlling terminal, it's possible for
|
||
|
# it to acquire one by opening a terminal in the future. This second
|
||
|
# fork guarantees that the child is no longer a session leader, thus
|
||
|
# preventing the daemon from ever acquiring a controlling terminal.
|
||
|
pid = os.fork() # Fork a second child.
|
||
|
except OSError, e:
|
||
|
return((e.errno, e.strerror)) # ERROR (return a tuple)
|
||
|
|
||
|
if (pid == 0): # The second child.
|
||
|
# Ensure that the daemon doesn't keep any directory in use. Failure
|
||
|
# to do this could make a filesystem unmountable.
|
||
|
#os.chdir("/")
|
||
|
# Give the child complete control over permissions.
|
||
|
os.umask(0)
|
||
|
else:
|
||
|
os._exit(0) # Exit parent (the first child) of the second child.
|
||
|
else:
|
||
|
os._exit(0) # Exit parent of the first child.
|
||
|
|
||
|
# Close all open files. Try the system configuration variable, SC_OPEN_MAX,
|
||
|
# for the maximum number of open files to close. If it doesn't exist, use
|
||
|
# the default value (configurable).
|
||
|
try:
|
||
|
maxfd = os.sysconf("SC_OPEN_MAX")
|
||
|
except (AttributeError, ValueError):
|
||
|
maxfd = 256 # default maximum
|
||
|
|
||
|
for fd in range(0, maxfd):
|
||
|
try:
|
||
|
os.close(fd)
|
||
|
except OSError: # ERROR (ignore)
|
||
|
pass
|
||
|
|
||
|
# Redirect the standard file descriptors to /dev/null.
|
||
|
os.open("/dev/null", os.O_RDONLY) # standard input (0)
|
||
|
#os.open("/dev/null", os.O_RDWR) # standard output (1)
|
||
|
os.open("/tmp/fail2ban.log", os.O_CREAT|os.O_APPEND|os.O_RDWR) # standard output (1)
|
||
|
#os.open("/dev/null", os.O_RDWR) # standard error (2)
|
||
|
os.open("/tmp/fail2ban.log", os.O_CREAT|os.O_APPEND|os.O_RDWR) # standard error (2)
|
||
|
|
||
|
return(0)
|
||
|
|
||
|
|
||
|
if __name__ == "__main__":
|
||
|
|
||
|
try:
|
||
|
optList, args = getopt.getopt(sys.argv[1:], 'hvb')
|
||
|
except getopt.GetoptError:
|
||
|
usage()
|
||
|
|
||
|
verbose = False
|
||
|
for opt in optList:
|
||
|
if opt[0] == "-h":
|
||
|
usage()
|
||
|
if opt[0] == "-v":
|
||
|
verbose = True
|
||
|
if opt[0] == "-b":
|
||
|
retCode = createDaemon()
|
||
|
if retCode != 0:
|
||
|
print "Unable to start daemon"
|
||
|
sys.exit(-1)
|
||
|
|
||
|
if not checkForRoot():
|
||
|
print "You must be root."
|
||
|
#sys.exit(-1)
|
||
|
|
||
|
fireWall = Iptables(600, verbose = verbose)
|
||
|
logFile = Metalog("./log-test/test", 600, verbose = verbose)
|
||
|
|
||
|
logFile.addIgnoreIP("127.0.0.1")
|
||
|
|
||
|
while True:
|
||
|
try:
|
||
|
sys.stdout.flush()
|
||
|
sys.stderr.flush()
|
||
|
|
||
|
fireWall.checkForUnBan()
|
||
|
|
||
|
if not logFile.isModified():
|
||
|
time.sleep(1)
|
||
|
continue
|
||
|
|
||
|
failList = logFile.getPwdFailure()
|
||
|
|
||
|
iterFailList = failList.iteritems()
|
||
|
for i in range(len(failList)):
|
||
|
element = iterFailList.next()
|
||
|
if element[1][0] > 2:
|
||
|
fireWall.addBanIP(element[0])
|
||
|
|
||
|
except KeyboardInterrupt:
|
||
|
print 'Restoring iptables...'
|
||
|
fireWall.flushBanList()
|
||
|
print 'Exiting...'
|
||
|
sys.exit(0)
|