mirror of https://github.com/fail2ban/fail2ban
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
399 lines
12 KiB
399 lines
12 KiB
# This file is part of Fail2Ban.
|
|
#
|
|
# Fail2Ban is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 2 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# Fail2Ban is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with Fail2Ban; if not, write to the Free Software
|
|
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
# Author: Cyril Jaquier
|
|
#
|
|
# $Revision$
|
|
|
|
__author__ = "Cyril Jaquier"
|
|
__version__ = "$Revision$"
|
|
__date__ = "$Date$"
|
|
__copyright__ = "Copyright (c) 2004 Cyril Jaquier"
|
|
__license__ = "GPL"
|
|
|
|
import time, sys, getopt, os, string, signal, log4py
|
|
from ConfigParser import *
|
|
|
|
from version import version
|
|
from firewall.firewall import Firewall
|
|
from logreader.logreader import LogReader
|
|
from confreader.configreader import ConfigReader
|
|
from utils.mail import Mail
|
|
from utils.dns import *
|
|
from utils.process import *
|
|
|
|
# Gets the instance of log4py.
|
|
logSys = log4py.Logger().get_instance()
|
|
|
|
# Global variables
|
|
logFwList = list()
|
|
conf = dict()
|
|
|
|
def dispUsage():
|
|
""" Prints Fail2Ban command line options and exits
|
|
"""
|
|
print "Usage: "+sys.argv[0]+" [OPTIONS]"
|
|
print
|
|
print "Fail2Ban v"+version+" reads log file that contains password failure report"
|
|
print "and bans the corresponding IP addresses using firewall rules."
|
|
print
|
|
print " -b start fail2ban in background"
|
|
print " -d start fail2ban in debug mode"
|
|
print " -c <FILE> read configuration file FILE"
|
|
print " -p <FILE> create PID lock in FILE"
|
|
print " -h display this help message"
|
|
print " -i <IP(s)> IP(s) to ignore"
|
|
print " -k kill a currently running Fail2Ban instance"
|
|
print " -r <VALUE> allow a max of VALUE password failure"
|
|
print " -t <TIME> ban IP for TIME seconds"
|
|
print " -v verbose. Use twice for greater effect"
|
|
print " -V print software version"
|
|
print
|
|
print "Report bugs to <lostcontrol@users.sourceforge.net>"
|
|
sys.exit(0)
|
|
|
|
def dispVersion():
|
|
""" Prints Fail2Ban version and exits
|
|
"""
|
|
print sys.argv[0]+" "+version
|
|
sys.exit(0)
|
|
|
|
def checkForRoot():
|
|
""" Check for root user.
|
|
"""
|
|
uid = `os.getuid()`
|
|
if uid == '0':
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
def sigTERMhandler(signum, frame):
|
|
""" Handles the TERM signal when in daemon mode in order to
|
|
exit properly.
|
|
"""
|
|
logSys.debug("Signal handler called with sig "+`signum`)
|
|
killApp()
|
|
|
|
def killApp():
|
|
""" Flush the ban list, remove the PID lock file and exit
|
|
nicely.
|
|
"""
|
|
logSys.warn("Restoring firewall rules...")
|
|
for element in logFwList:
|
|
element[2].flushBanList(conf["debug"])
|
|
# Execute end command of each section
|
|
for element in logFwList:
|
|
l = element[4]
|
|
executeCmd(l["fwend"], conf["debug"])
|
|
# Execute global start command
|
|
executeCmd(conf["cmdend"], conf["debug"])
|
|
# Remove the PID lock
|
|
removePID(conf["pidlock"])
|
|
logSys.info("Exiting...")
|
|
sys.exit(0)
|
|
|
|
def getCmdLineOptions(optList):
|
|
""" Gets the command line options
|
|
"""
|
|
for opt in optList:
|
|
if opt[0] in ["-h", "--help"]:
|
|
dispUsage()
|
|
if opt[0] in ["-V", "--version"]:
|
|
dispVersion()
|
|
if opt[0] == "-v":
|
|
conf["verbose"] = conf["verbose"] + 1
|
|
if opt[0] == "-b":
|
|
conf["background"] = True
|
|
if opt[0] == "-d":
|
|
conf["debug"] = True
|
|
if opt[0] == "-t":
|
|
try:
|
|
conf["bantime"] = int(opt[1])
|
|
except ValueError:
|
|
logSys.warn("banTime must be an integer")
|
|
logSys.warn("Using default value")
|
|
if opt[0] == "-i":
|
|
conf["ignoreip"] = opt[1]
|
|
if opt[0] == "-r":
|
|
conf["maxretry"] = int(opt[1])
|
|
if opt[0] == "-p":
|
|
conf["pidlock"] = opt[1]
|
|
if opt[0] == "-k":
|
|
pid = checkForPID(conf["pidlock"])
|
|
if pid:
|
|
killPID(int(pid))
|
|
logSys.warn("Killed Fail2Ban with PID "+pid)
|
|
sys.exit(0)
|
|
else:
|
|
logSys.error("No running Fail2Ban found")
|
|
sys.exit(-1)
|
|
|
|
def main():
|
|
""" Fail2Ban main function
|
|
"""
|
|
logSys.set_formatstring("%T %L %M")
|
|
|
|
conf["verbose"] = 0
|
|
conf["conffile"] = "/etc/fail2ban.conf"
|
|
|
|
# Reads the command line options.
|
|
try:
|
|
cmdOpts = 'hvVbdkc:t:i:r:p:'
|
|
cmdLongOpts = ['help','version']
|
|
optList, args = getopt.getopt(sys.argv[1:], cmdOpts, cmdLongOpts)
|
|
except getopt.GetoptError:
|
|
dispUsage()
|
|
|
|
# Pre-parsing of command line options for the -c option
|
|
for opt in optList:
|
|
if opt[0] == "-c":
|
|
conf["conffile"] = opt[1]
|
|
|
|
# Reads the config file and create a LogReader instance for
|
|
# each log file to check.
|
|
confReader = ConfigReader(conf["conffile"]);
|
|
confReader.openConf()
|
|
|
|
# Options
|
|
optionValues = (["bool", "background", False],
|
|
["str", "logtargets", "STDOUT /var/log/fail2ban.log"],
|
|
["bool", "debug", False],
|
|
["str", "pidlock", "/var/run/fail2ban.pid"],
|
|
["int", "maxretry", 3],
|
|
["int", "bantime", 600],
|
|
["str", "ignoreip", ""],
|
|
["int", "polltime", 1],
|
|
["str", "cmdstart", ""],
|
|
["str", "cmdend", ""])
|
|
|
|
# Gets global configuration options
|
|
conf.update(confReader.getLogOptions("DEFAULT", optionValues))
|
|
|
|
# Gets command line options
|
|
getCmdLineOptions(optList)
|
|
|
|
# Process some options
|
|
# Log targets
|
|
# Bug fix for #1234699
|
|
os.umask(0077)
|
|
# Remove all the targets before setting our own
|
|
logSys.remove_all_targets()
|
|
for target in conf["logtargets"].split():
|
|
if target == "STDOUT":
|
|
logSys.add_target(log4py.TARGET_SYS_STDOUT)
|
|
elif target == "STDERR":
|
|
logSys.add_target(log4py.TARGET_SYS_STDERR)
|
|
elif target == "SYSLOG":
|
|
logSys.add_target(log4py.TARGET_SYSLOG)
|
|
else:
|
|
# Target should be a file
|
|
try:
|
|
open(target, "a")
|
|
logSys.add_target(target)
|
|
except IOError:
|
|
logSys.error("Unable to log to " + target)
|
|
|
|
# Check if at least one target exists
|
|
if len(logSys.get_targets()) == 0:
|
|
logSys.add_target(log4py.TARGET_SYS_STDOUT)
|
|
logSys.error("No valid logging target found. Logging to STDOUT")
|
|
|
|
# Verbose level
|
|
if conf["verbose"]:
|
|
logSys.warn("Verbose level is "+`conf["verbose"]`)
|
|
if conf["verbose"] == 1:
|
|
logSys.set_loglevel(log4py.LOGLEVEL_VERBOSE)
|
|
elif conf["verbose"] > 1:
|
|
logSys.set_loglevel(log4py.LOGLEVEL_DEBUG)
|
|
|
|
# Set debug log level
|
|
if conf["debug"]:
|
|
logSys.set_loglevel(log4py.LOGLEVEL_DEBUG)
|
|
logSys.set_formatstring(log4py.FMT_DEBUG)
|
|
logSys.warn("DEBUG MODE: FIREWALL COMMANDS ARE _NOT_ EXECUTED BUT " +
|
|
"ONLY DISPLAYED IN THE LOG MESSAGES")
|
|
|
|
# Start Fail2Ban in daemon mode
|
|
if conf["background"]:
|
|
retCode = createDaemon()
|
|
signal.signal(signal.SIGTERM, sigTERMhandler)
|
|
if not retCode:
|
|
logSys.error("Unable to start daemon")
|
|
sys.exit(-1)
|
|
|
|
# Ignores IP list
|
|
ignoreIPList = conf["ignoreip"].split(' ')
|
|
|
|
# maxretry option
|
|
maxRetry = conf["maxretry"]
|
|
|
|
# bantime option
|
|
banTime = conf["bantime"]
|
|
|
|
# Checks for root user. This is necessary because log files
|
|
# are owned by root and firewall needs root access.
|
|
if not checkForRoot():
|
|
logSys.error("You must be root")
|
|
if not conf["debug"]:
|
|
sys.exit(-1)
|
|
|
|
# Checks that no instance of Fail2Ban is currently running.
|
|
pid = checkForPID(conf["pidlock"])
|
|
if pid:
|
|
logSys.error("Fail2Ban already running with PID "+pid)
|
|
sys.exit(-1)
|
|
else:
|
|
createPID(conf["pidlock"])
|
|
|
|
logSys.debug("ConfFile is "+conf["conffile"])
|
|
logSys.debug("BanTime is "+`conf["bantime"]`)
|
|
logSys.debug("retryAllowed is "+`conf["maxretry"]`)
|
|
|
|
# Options
|
|
optionValues = (["bool", "enabled", False],
|
|
["str", "host", "localhost"],
|
|
["int", "port", "25"],
|
|
["str", "from", "root"],
|
|
["str", "to", "root"],
|
|
["str", "subject", "[Fail2Ban] Banned <ip>"],
|
|
["str", "message", "Fail2Ban notification"])
|
|
|
|
# Gets global configuration options
|
|
mailConf = confReader.getLogOptions("MAIL", optionValues)
|
|
|
|
# Create mailer if enabled
|
|
if mailConf["enabled"]:
|
|
logSys.debug("Mail enabled")
|
|
mail = Mail(mailConf["host"], mailConf["port"])
|
|
mail.setFromAddr(mailConf["from"])
|
|
mail.setToAddr(mailConf["to"])
|
|
logSys.debug("to: " + mailConf["to"] + " from: " + mailConf["from"])
|
|
|
|
# Options
|
|
optionValues = (["bool", "enabled", False],
|
|
["str", "logfile", "/dev/null"],
|
|
["int", "maxretry", None],
|
|
["int", "bantime", None],
|
|
["str", "timeregex", ""],
|
|
["str", "timepattern", ""],
|
|
["str", "failregex", ""],
|
|
["str", "fwstart", ""],
|
|
["str", "fwend", ""],
|
|
["str", "fwban", ""],
|
|
["str", "fwunban", ""])
|
|
|
|
# Gets the options of each sections
|
|
for t in confReader.getSections():
|
|
l = confReader.getLogOptions(t, optionValues)
|
|
if l["enabled"]:
|
|
# Override maxretry option
|
|
if not l["maxretry"] == None:
|
|
maxRetry = l["maxretry"]
|
|
|
|
# Override bantime option
|
|
if not l["bantime"] == None:
|
|
banTime = l["bantime"]
|
|
|
|
# Creates a logreader object
|
|
lObj = LogReader(l["logfile"], l["timeregex"], l["timepattern"],
|
|
l["failregex"], maxRetry, banTime)
|
|
# Creates a firewall object
|
|
fObj = Firewall(l["fwban"], l["fwunban"], banTime)
|
|
# Links them into a list. I'm not really happy
|
|
# with this :/
|
|
logFwList.append([t, lObj, fObj, dict(), l])
|
|
|
|
# We add 127.0.0.1 to the ignore list has we do not want
|
|
# to be ban ourself.
|
|
for element in logFwList:
|
|
element[1].addIgnoreIP("127.0.0.1")
|
|
while len(ignoreIPList) > 0:
|
|
ip = ignoreIPList.pop()
|
|
# Bug fix for #1239557
|
|
if isValidIP(ip):
|
|
for element in logFwList:
|
|
element[1].addIgnoreIP(ip)
|
|
|
|
logSys.info("Fail2Ban v"+version+" is running")
|
|
# Execute global start command
|
|
executeCmd(conf["cmdstart"], conf["debug"])
|
|
# Execute start command of each section
|
|
for element in logFwList:
|
|
l = element[4]
|
|
executeCmd(l["fwstart"], conf["debug"])
|
|
# Main loop
|
|
while True:
|
|
try:
|
|
sys.stdout.flush()
|
|
sys.stderr.flush()
|
|
|
|
# Checks if some IP have to be remove from ban
|
|
# list.
|
|
for element in logFwList:
|
|
element[2].checkForUnBan(conf["debug"])
|
|
|
|
# If the log file has not been modified since the
|
|
# last time, we sleep for 1 second. This is active
|
|
# polling so not very effective.
|
|
modList = list()
|
|
for element in logFwList:
|
|
if element[1].isModified():
|
|
modList.append(element)
|
|
|
|
if len(modList) == 0:
|
|
time.sleep(conf["polltime"])
|
|
continue
|
|
|
|
# Gets the failure list from the log file. For a given IP,
|
|
# takes only the service which has the most password failures.
|
|
for element in modList:
|
|
e = element[1].getFailures()
|
|
for key in e.iterkeys():
|
|
if element[3].has_key(key):
|
|
element[3][key] = (element[3][key][0] + e[key][0],
|
|
e[key][1])
|
|
else:
|
|
element[3][key] = (e[key][0], e[key][1])
|
|
|
|
# Remove the oldest failure attempts from the global list.
|
|
# We iterate the failure list and ban IP that make
|
|
# *retryAllowed* login failures.
|
|
unixTime = time.time()
|
|
for element in logFwList:
|
|
fails = element[3].copy()
|
|
findTime = element[1].getFindTime()
|
|
for attempt in fails:
|
|
failTime = fails[attempt][1]
|
|
if failTime < unixTime - findTime:
|
|
del element[3][attempt]
|
|
elif fails[attempt][0] >= element[1].getMaxRetry():
|
|
aInfo = {"ip": attempt,
|
|
"failures": element[3][attempt][0],
|
|
"failtime": failTime}
|
|
logSys.info(element[0] + ": " + aInfo["ip"] +
|
|
" has " + `aInfo["failures"]` +
|
|
" login failure(s). Banned.")
|
|
element[2].addBanIP(aInfo, conf["debug"])
|
|
# Send a mail notification
|
|
if 'mail' in locals():
|
|
mail.sendmail(mailConf["subject"],
|
|
mailConf["message"], aInfo)
|
|
del element[3][attempt]
|
|
|
|
except KeyboardInterrupt:
|
|
# When the user press <ctrl>+<c> we exit nicely.
|
|
killApp()
|