uff - nasty refactoring to make fail2ban loop if there is some error occur

debian-releases/etch debian/0.5.4-5.7
Yaroslav Halchenko 2005-10-12 05:11:16 +00:00
parent d7dc8f35d1
commit 03e7d722de
6 changed files with 181 additions and 112 deletions

View File

@ -185,9 +185,15 @@ fwstart = iptables -N fail2ban-http
# Values: CMD Default: # Values: CMD Default:
# #
fwend = iptables -D INPUT -p tcp --dport http -j fail2ban-http fwend = iptables -D INPUT -p tcp --dport http -j fail2ban-http
iptables -D fail2ban-http -j RETURN iptables -F fail2ban-http
iptables -X fail2ban-http iptables -X fail2ban-http
# Option: fwcheck
# Notes.: command executed once before each fwban command
# Values: CMD Default:
#
fwcheck = iptables -L INPUT | grep -q fail2ban-http
# Option: fwban # Option: fwban
# Notes.: command executed when banning an IP. Take care that the # Notes.: command executed when banning an IP. Take care that the
# command is executed with Fail2Ban user rights. # command is executed with Fail2Ban user rights.
@ -257,9 +263,15 @@ fwstart = iptables -N fail2ban-ssh
# Values: CMD Default: # Values: CMD Default:
# #
fwend = iptables -D INPUT -p tcp --dport ssh -j fail2ban-ssh fwend = iptables -D INPUT -p tcp --dport ssh -j fail2ban-ssh
iptables -D fail2ban-ssh -j RETURN iptables -F fail2ban-ssh
iptables -X fail2ban-ssh iptables -X fail2ban-ssh
# Option: fwcheck
# Notes.: command executed once before each fwban command
# Values: CMD Default:
#
fwcheck = iptables -L INPUT | grep -q fail2ban-ssh
# Option: fwbanrule # Option: fwbanrule
# Notes.: command executed when banning an IP. Take care that the # Notes.: command executed when banning an IP. Take care that the
# command is executed with Fail2Ban user rights. # command is executed with Fail2Ban user rights.

5
debian/changelog vendored
View File

@ -1,4 +1,4 @@
fail2ban (0.5.4-5.6) unstable; urgency=low fail2ban (0.5.4-5.7) unstable; urgency=low
* Added a notification regarding the importance of 0.5.4-5 change of * Added a notification regarding the importance of 0.5.4-5 change of
failregex in the config file failregex in the config file
@ -11,6 +11,9 @@ fail2ban (0.5.4-5.6) unstable; urgency=low
SSH: Illegal -> Invalid. Should match both now SSH: Illegal -> Invalid. Should match both now
* Fixed a problem of raise AttributeError exception reported as a side * Fixed a problem of raise AttributeError exception reported as a side
effect of crash during parsing of the config file effect of crash during parsing of the config file
* Introduced fwcheck option to verify consistency of the
chains. Implemented automatic restart of fail2ban main function in
case if check of fwban failed. Should close few bugs
-- Yaroslav Halchenko <debian@onerussian.com> Mon, 3 Oct 2005 22:26:28 -1000 -- Yaroslav Halchenko <debian@onerussian.com> Mon, 3 Oct 2005 22:26:28 -1000

View File

@ -26,7 +26,7 @@ __date__ = "$Date: 2005/08/04 20:51:14 $"
__copyright__ = "Copyright (c) 2004 Cyril Jaquier" __copyright__ = "Copyright (c) 2004 Cyril Jaquier"
__license__ = "GPL" __license__ = "GPL"
import sys, traceback, logging import sys, traceback, logging, time
# Appends our own modules path. # Appends our own modules path.
sys.path.append("/usr/share/fail2ban") sys.path.append("/usr/share/fail2ban")
@ -34,6 +34,16 @@ sys.path.append("/usr/share/fail2ban")
# Now we can import our modules. # Now we can import our modules.
import fail2ban import fail2ban
from utils.pidlock import PIDLock from utils.pidlock import PIDLock
from utils.process import ExternalError
# Start the application. Handle all the unhandled exceptions
# yoh: I don't think that this parameters need to be configured
# and probably maxRestarts should be removed
legitRestartTime = 10 # legitimate minimal restart time
maxRestarts = 100 # max number of times to perform restart
lastRestartTime = time.time()
restarts = 0
# Get the instance of the logger. # Get the instance of the logger.
logSys = logging.getLogger("fail2ban") logSys = logging.getLogger("fail2ban")
@ -41,9 +51,21 @@ logSys = logging.getLogger("fail2ban")
# Get PID lock file instance # Get PID lock file instance
pidLock = PIDLock() pidLock = PIDLock()
# Start the application. Handle all the unhandled exceptions
try: try:
fail2ban.main() while True:
restarts += 1
try:
fail2ban.main(restarts>1)
except ExternalError, e:
# There went something wrong while dealing with Iptables. May be chain got
# removed?
logSys.error("Fail2Ban got a problem: " + e.__str__())
if (time.time() - lastRestartTime > legitRestartTime) and (restarts < maxRestarts):
logSys.error("Restarting for the %d time "%restarts)
lastRestartTime = time.time()
else:
logSys.error("Exiting: restarts follow too often, or too many restart attempts")
sys.exit(0)
except SystemExit: except SystemExit:
# We called sys.exit(). Nothing wrong so just pass # We called sys.exit(). Nothing wrong so just pass
pass pass
@ -55,6 +77,9 @@ except Exception, e:
logSys.error("Type: " + `type.__name__` + "\n" + logSys.error("Type: " + `type.__name__` + "\n" +
"Value: " + `e.args` + "\n" + "Value: " + `e.args` + "\n" +
"TB: " + `tbStack`) "TB: " + `tbStack`)
# Remove the PID lock file. Should close #1239562 # Remove the PID lock file. Should close #1239562
pidLock.remove() pidLock.remove()
logSys.info("Exiting...")
logging.shutdown() logging.shutdown()

View File

@ -92,9 +92,8 @@ def sigTERMhandler(signum, frame):
logSys.debug("Signal handler called with sig "+`signum`) logSys.debug("Signal handler called with sig "+`signum`)
killApp() killApp()
def killApp(): def restoreFwRules():
""" Flush the ban list, remove the PID lock file and exit """ Flush the ban list
nicely.
""" """
logSys.warn("Restoring firewall rules...") logSys.warn("Restoring firewall rules...")
for element in logFwList: for element in logFwList:
@ -103,12 +102,15 @@ def killApp():
for element in logFwList: for element in logFwList:
l = element[4] l = element[4]
executeCmd(l["fwend"], conf["debug"]) executeCmd(l["fwend"], conf["debug"])
# Execute global start command # Execute global end command
executeCmd(conf["cmdend"], conf["debug"]) executeCmd(conf["cmdend"], conf["debug"])
# Remove the PID lock
pidLock.remove() def killApp():
logSys.info("Exiting...") """ Flush the ban list, remove and exit
logging.shutdown() nicely.
"""
# Restore Fw rules
restoreFwRules()
sys.exit(0) sys.exit(0)
def getCmdLineOptions(optList): def getCmdLineOptions(optList):
@ -136,9 +138,12 @@ def getCmdLineOptions(optList):
if opt[0] == "-k": if opt[0] == "-k":
conf["kill"] = True conf["kill"] = True
def main(): def main(secondaryStart):
""" Fail2Ban main function """ Fail2Ban main function
""" """
# (re)Initialize global variables
logFwList.__init__()
conf.clear()
# Add the default logging handler # Add the default logging handler
stdout = logging.StreamHandler(sys.stdout) stdout = logging.StreamHandler(sys.stdout)
@ -213,8 +218,12 @@ def main():
except KeyError: except KeyError:
pass pass
# If it is not a hot restart
# fork, setup logging, create pid, check for root
if not secondaryStart:
# Start Fail2Ban in daemon mode # Start Fail2Ban in daemon mode
if conf["background"]: if conf["background"]:
logSys.debug("Daemonizing")
retCode = createDaemon() retCode = createDaemon()
signal.signal(signal.SIGTERM, sigTERMhandler) signal.signal(signal.SIGTERM, sigTERMhandler)
if not retCode: if not retCode:
@ -292,9 +301,6 @@ def main():
logSys.warn("DEBUG MODE: FIREWALL COMMANDS ARE _NOT_ EXECUTED BUT " + logSys.warn("DEBUG MODE: FIREWALL COMMANDS ARE _NOT_ EXECUTED BUT " +
"ONLY DISPLAYED IN THE LOG MESSAGES") "ONLY DISPLAYED IN THE LOG MESSAGES")
# Ignores IP list
ignoreIPList = conf["ignoreip"].split(' ')
# Checks for root user. This is necessary because log files # Checks for root user. This is necessary because log files
# are owned by root and firewall needs root access. # are owned by root and firewall needs root access.
if not checkForRoot(): if not checkForRoot():
@ -313,6 +319,9 @@ def main():
# Unable to create PID lock. Exit # Unable to create PID lock. Exit
sys.exit(-1) sys.exit(-1)
# Ignores IP list
ignoreIPList = conf["ignoreip"].split(' ')
logSys.debug("ConfFile is " + conf["conffile"]) logSys.debug("ConfFile is " + conf["conffile"])
logSys.debug("BanTime is " + `conf["bantime"]`) logSys.debug("BanTime is " + `conf["bantime"]`)
logSys.debug("FindTime is " + `conf["findtime"]`) logSys.debug("FindTime is " + `conf["findtime"]`)
@ -350,7 +359,8 @@ def main():
["str", "fwstart", ""], ["str", "fwstart", ""],
["str", "fwend", ""], ["str", "fwend", ""],
["str", "fwban", ""], ["str", "fwban", ""],
["str", "fwunban", ""]) ["str", "fwunban", ""],
["str", "fwcheck", ""])
logSys.info("Fail2Ban v" + version + " is running") logSys.info("Fail2Ban v" + version + " is running")
@ -364,7 +374,7 @@ def main():
lObj = LogReader(l["logfile"], l["timeregex"], l["timepattern"], lObj = LogReader(l["logfile"], l["timeregex"], l["timepattern"],
l["failregex"], l["maxfailures"], l["findtime"]) l["failregex"], l["maxfailures"], l["findtime"])
# Creates a firewall object # Creates a firewall object
fObj = Firewall(l["fwban"], l["fwunban"], l["bantime"]) fObj = Firewall(l["fwban"], l["fwunban"], l["fwcheck"], l["bantime"])
# Links them into a list. I'm not really happy # Links them into a list. I'm not really happy
# with this :/ # with this :/
logFwList.append([t, lObj, fObj, dict(), l]) logFwList.append([t, lObj, fObj, dict(), l])
@ -449,7 +459,10 @@ def main():
mail.sendmail(mailConf["subject"], mail.sendmail(mailConf["subject"],
mailConf["message"], aInfo) mailConf["message"], aInfo)
del element[3][attempt] del element[3][attempt]
except ExternalError:
# restore as much as possible before restart
restoreFwRules()
raise
except KeyboardInterrupt: except KeyboardInterrupt:
# When the user press <ctrl>+<c> we exit nicely. # When the user press <ctrl>+<c> we exit nicely.
killApp() killApp()

View File

@ -28,6 +28,7 @@ import time, os, logging, re
from utils.process import executeCmd from utils.process import executeCmd
from utils.strings import replaceTag from utils.strings import replaceTag
from utils.process import ExternalError
# Gets the instance of the logger. # Gets the instance of the logger.
logSys = logging.getLogger("fail2ban") logSys = logging.getLogger("fail2ban")
@ -37,9 +38,10 @@ class Firewall:
the IP. the IP.
""" """
def __init__(self, banRule, unBanRule, banTime): def __init__(self, banRule, unBanRule, checkRule, banTime):
self.banRule = banRule self.banRule = banRule
self.unBanRule = unBanRule self.unBanRule = unBanRule
self.checkRule = checkRule
self.banTime = banTime self.banTime = banTime
self.banList = dict() self.banList = dict()
@ -52,7 +54,10 @@ class Firewall:
logSys.warn("Ban " + ip) logSys.warn("Ban " + ip)
self.banList[ip] = crtTime self.banList[ip] = crtTime
aInfo["bantime"] = crtTime aInfo["bantime"] = crtTime
executeCmd(self.banIP(aInfo), debug) self.runCheck("pre-fwban", debug)
cmd = self.banIP(aInfo)
if executeCmd(cmd, debug):
raise ExternalError("Firewall: execution of fwban command '%s' failed"%cmd)
else: else:
logSys.error(ip+" already in ban list") logSys.error(ip+" already in ban list")
@ -63,6 +68,7 @@ class Firewall:
if self.inBanList(ip): if self.inBanList(ip):
logSys.warn("Unban "+ip) logSys.warn("Unban "+ip)
del self.banList[ip] del self.banList[ip]
self.runCheck("pre-fwunban", debug)
executeCmd(self.unBanIP(aInfo), debug) executeCmd(self.unBanIP(aInfo), debug)
else: else:
logSys.error(ip+" not in ban list") logSys.error(ip+" not in ban list")
@ -72,6 +78,12 @@ class Firewall:
""" """
return self.banList.has_key(ip) return self.banList.has_key(ip)
def runCheck(self, location, debug):
""" Runs fwcheck command and throws an exception if it returns non-0 result """
if executeCmd(self.checkRule, debug):
raise ExternalError("Firewall: %s fwcheck command '%s' failed"
%(location,self.checkRule))
def checkForUnBan(self, debug): def checkForUnBan(self, debug):
""" Check for IP to remove from ban list. """ Check for IP to remove from ban list.
""" """

View File

@ -29,6 +29,10 @@ import os, logging, signal
# Gets the instance of the logger. # Gets the instance of the logger.
logSys = logging.getLogger("fail2ban") logSys = logging.getLogger("fail2ban")
class ExternalError(UserWarning):
""" Exception to warn about failed fwcheck or fwban command """
pass
def createDaemon(): def createDaemon():
""" Detach a process from the controlling terminal and run it in the """ Detach a process from the controlling terminal and run it in the
background as a daemon. background as a daemon.