You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
fail2ban/README

120 lines
3.6 KiB

__ _ _ ___ _
/ _|__ _(_) |_ ) |__ __ _ _ _
| _/ _` | | |/ /| '_ \/ _` | ' \
|_| \__,_|_|_/___|_.__/\__,_|_||_|
=============================================================
Fail2Ban (version 0.1.0) 10/12/2004
=============================================================
Fail2Ban scans log files like /var/log/pwdfail and bans IP
that makes too much password failures. It updates firewall
rules to reject the IP address. Currently sshd and iptables
are supported. It needs log4py.
This is my first Python program. I began learning Python for
less than one week so please be understanding ;-) English is
not either my mother tongue...
More details:
-------------
Fail2Ban is rather simple. I have a home server connected to
the Internet which runs apache, samba, sshd, ... I see in my
logs that people are trying to log into my box using "manual"
brute force or scripts. They try 10, 20 and sometimes more
user/password (without success anyway). In order to
discourage these script kiddies, I wanted that sshd refuse
login from a specific ip after 3 password failures. After
some google searches, I found that sshd was not able of that.
So I search for a script or program that do it. Found
nothing :-( So I decide to write mine and to learn Python :-)
I read the log file (/var/log/pwdfail/current on metalog) and
search for line with "Failed password". Then get the ip and
if it has already done 3 or more password failure in the last
banTime, I ban the ip for banTime using a iptable rule. After
banTime, the rule is deleted.
Runs on my server and does its job rather well :-) The idea
is to make fail2ban usable with most syslog daemons and
services that require a login (sshd, telnetd, ...). It should
also support others firewalls than iptables.
Installation:
-------------
Require: python-2.2 (http://www.python.org)
log4py-1.1 (http://sourceforge.net/projects/log4py)
To install, just do:
> tar xvfj fail2ban-0.1.0.tar.bz2
> cd fail2ban-0.1.0
> python setup.py install
This will install Fail2Ban into /usr/lib/fail2ban. The
fail2ban.py executable is placed into /usr/bin.
Fail2Ban should now be correctly installed. Just type:
> fail2ban.py -h
to see if everything is alright.
Configuration:
--------------
For the time, there is no configuration file. You must use
commande line options instead. Here are the options:
-b start fail2ban in background
-d start fail2ban in debug mode
-f <FILE> read password failure from FILE
-h display this help message
-l <FILE> log message in FILE
-r <VALUE> allow a max of VALUE password failure
-t <TIME> ban IP for TIME seconds
-v verbose
Contact:
--------
You need some new features, you found bugs or you just
appreciate this program, you can contact me at :
Website: http://www.sourceforge.net/projects/fail2ban
Cyril Jaquier: <lostcontrol@users.sourceforge.net>
Thanks:
-------
K<EFBFBD>vin Drapel, Marvin Rouge
License:
--------
Fail2Ban is free software; you can redistribute it
and/or modify it under the terms of the GNU General Public
License as published by the Free Software Foundation; either
version 2 of the License, or (at your option) any later
version.
Fail2Ban is distributed in the hope that it will be
useful, but WITHOUT ANY WARRANTY; without even the implied
warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
PURPOSE. See the GNU General Public License for more
details.
You should have received a copy of the GNU General Public
License along with Fail2Ban; if not, write to the Free
Software Foundation, Inc., 59 Temple Place, Suite 330,
Boston, MA 02111-1307 USA