New filter: routeros-auth.conf (Closes #3469)

Add filter to detect failed login attempts in the log produced by
MikroTik RouterOS.

- Add the filter to jail.conf
- Add testcase for the filter

Signed-off-by: Vít Kabele <vit@kabele.me>
pull/3469/head
Vít Kabele 2023-02-28 07:34:16 +01:00 committed by Vít Kabele
parent 234660e94d
commit a2c77429b9
3 changed files with 28 additions and 0 deletions

View File

@ -0,0 +1,10 @@
# Fail2Ban filter for failure attempts in MikroTik RouterOS
#
#
[Definition]
failregex = ^\s*\S+ system,error,critical login failure for user <F-USER>.*?</F-USER> from <ADDR> via \S+$
# Author: Vit Kabele <vit@kabele.me>

View File

@ -958,6 +958,9 @@ port = http,https
logpath = %(syslog_authpriv)s
backend = %(syslog_backend)s
[routeros-auth]
port = ssh,http,https
logpath = /var/log/MikroTik/router.log
[zoneminder]
# Zoneminder HTTP/HTTPS web interface auth

View File

@ -0,0 +1,15 @@
# RouterOS v7.5
# failJSON: { "time": "2005-02-15T11:25:46", "match": true , "host": "192.168.88.6", "user": "admin" }
Feb 15 11:25:46 gw.local system,error,critical login failure for user admin from 192.168.88.6 via web
# RouterOS v7.5
# failJSON: { "match": false }
Feb 15 11:26:15 gw.local system,info log rule changed by admin
# RouterOS v7.5
# failJSON: { "time": "2005-02-15T11:57:42", "match": true , "host": "2001:470:1:c84::24", "user": "" }
Feb 15 11:57:42 1234.hostname.cz system,error,critical login failure for user from 2001:470:1:c84::24 via ssh
# RouterOS v7.5
# failJSON: { "time": "2005-03-02T09:09:46", "match": true , "host": "1.2.3.4", "user": "user with space" }
Mar 2 09:09:46 gw.local system,error,critical login failure for user user with space from 1.2.3.4 via ssh